Networks and Security
201 – 210 of 235
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2018
-
Mark
Evaluating Security of Software Through Vulnerability Metrics
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Trust Anchors in Software Defined Networks
2018) European Symposium on Research in Computer Security In Lecture Notes in Computer Science 11009. p.485-505(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Industrial Practices in Security Vulnerability Management for IoT Systems – an Interview Study
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Maximization of multicast periodic traffic throughput in multi-hop wireless networks with broadcast transmissions
(
- Contribution to journal › Article
-
Mark
Practical Attacks on Relational Databases Protected via Searchable Encryption
2018) 21st Information Security Conference, ISC 2018 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11060 LNCS. p.171-191(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Engaging Students using GitHub as a Learning Management System
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Path Generation for Affine Flow Thinning
(
- Contribution to journal › Article
- 2017
-
Mark
Standard-compliant LTE-A Uplink Scheduling Scheme with Quality of Service
(
- Contribution to journal › Article
-
Mark
Information Set Decoding with Soft Information and some cryptographic applications
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
OpenSAW: Open Security Analysis Workbench
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding