1 – 10 of 78
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2022
-
Mark
Security Issue Classification for Vulnerability Management with Semi-supervised Learning
(2022) p.84-95
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2021
-
Mark
Flowrider: Fast On-Demand Key Provisioning for Cloud Networks
(2021) EAI SecureComm 2021 - 17th EAI International Conference on Security and Privacy in Communication Networks
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Using Program Analysis to Identify the Use of Vulnerable Functions
(2021) p.520-530
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On-demand Key Distribution for Cloud Networks
(2021) 24th Conference on Innovation in Clouds, Internet and Networks (ICIN 2021)
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Grain-128AEAD, Round 3 Tweak and Motivation
(2021)
- Book/Report › Report
-
Mark
Communicating Cybersecurity Vulnerability Information: A Producer-Acquirer Case Study
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2020
-
Mark
Evaluation of the HAVOSS software process maturity model
(2020) Euromicro Conference on Software Engineering and Advanced Applications (SEAA), 2020 p.137-140
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Electromagnetic Side-Channel Attack on AES using Low-end Equipment
- Contribution to journal › Article
-
Mark
Energy Consumption for Securing Lightweight IoT Protocols
(2020)
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
