221 – 230 of 264
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2018
-
Mark
Path Generation for Affine Flow Thinning
- Contribution to journal › Article
-
Mark
Engaging Students using GitHub as a Learning Management System
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Energy-Optimal Data Aggregation and Dissemination for the Internet of Things
- Contribution to journal › Article
-
Mark
Social Norms and the Dominance of Low-Doers
- Contribution to journal › Article
-
Mark
Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code
(2018)
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Evaluating Security of Software Through Vulnerability Metrics
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Trust Anchors in Software Defined Networks
(2018) European Symposium on Research in Computer Security In Lecture Notes in Computer Science 11009. p.485-505
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Industrial Practices in Security Vulnerability Management for IoT Systems – an Interview Study
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Ouroboros-E : An Efficient Lattice-based Key-Exchange Protocol
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Practical Attacks on Relational Databases Protected via Searchable Encryption
(2018) 21st Information Security Conference, ISC 2018 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11060 LNCS. p.171-191
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
