1 – 10 of 15
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2020
-
Mark
A Recommender System for User-Specific Vulnerability Scoring
2020) 14th International Conference on Risk and Security of Internet and Systems, CRISIS 2019 In Lecture Notes in Computer Science 12026. p.355-364(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Multiple environmental influences on the lightning of cold-based continental cumulonimbus clouds. Part I : Description and validation of model
(
- Contribution to journal › Article
- 2019
-
Mark
Contributions to Preventive Measures in Cyber Security
2019) In Series of licentiate and doctoral theses(
- Thesis › Doctoral thesis (compilation)
-
Mark
Privacy-enabled Recommendations for Software Vulnerabilities
2019) 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Recommender System for User-specific Vulnerability Scoring (full version)
2019)(
- Other contribution › Miscellaneous
-
Mark
Evaluation of Different Irrigation Treatments with Saline Water in a Future Climate in Tunisia
(
- Contribution to journal › Article
- 2018
-
Mark
Trust Anchors in Software Defined Networks
2018) European Symposium on Research in Computer Security In Lecture Notes in Computer Science 11009. p.485-505(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Not so greedy : Enhanced subset exploration for nonrandomness detectors
2018) International Conference on Information Systems Security and Privacy In Communications in Computer and Information Science 867. p.273-294(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code
2018)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2017
-
Mark
Safeguarding VNF Credentials with Intel SGX
2017) p.144-146(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding