1 – 9 of 9
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2020
-
Mark
A Recommender System for User-Specific Vulnerability Scoring
2020) 14th International Conference on Risk and Security of Internet and Systems, CRISIS 2019 In Lecture Notes in Computer Science 12026. p.355-364(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2019
-
Mark
A Recommender System for User-specific Vulnerability Scoring (full version)
2019)(
- Other contribution › Miscellaneous
- 2018
-
Mark
Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code
2018)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Not so greedy : Enhanced subset exploration for nonrandomness detectors
2018) International Conference on Information Systems Security and Privacy In Communications in Computer and Information Science 867. p.273-294(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2017
-
Mark
Improved Greedy Nonrandomness Detectors for Stream Ciphers
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2016
-
Mark
Enabling Key Migration Between Non-Compatible TPM Versions
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2014
-
Mark
Using TPM Secure Storage in Trusted High Availability Systems
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
eavesROP: Listening for ROP Payloads in Data Streams
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
eavesROP: Listening for ROP Payloads in Data Streams (preliminary full version)
2014)(
- Book/Report › Report