131 – 140 of 208
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2018
-
Mark
Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code
2018)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Evaluating Security of Software Through Vulnerability Metrics
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Recognizing Human Actions by a Multi-Layer Growing Grid Architecture
2018) International Conference on Neural Networks (ICNN 2018)(
- Contribution to conference › Abstract
-
Mark
Towards Mission-Critical Control at the Edge and Over 5G
2018) IEEE Edge(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Test of Reconfigurable Modules in Scan Networks
(
- Contribution to journal › Article
-
Mark
Collaborative working architecture for IoT-based applications
(
- Contribution to journal › Article
-
Mark
Error Amplification in Code-based Cryptography
2018) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2019(1). p.238-258(
- Contribution to journal › Article
-
Mark
On-Chip Fault Monitoring Using Self-Reconfiguring IEEE 1687 Networks
(
- Contribution to journal › Article
-
Mark
Control-Theoretical Software Adaptation: A Systematic Literature Review
(
- Contribution to journal › Article
-
Mark
Optimization of message encryption for real-time applications in embedded systems
(
- Contribution to journal › Article