111 – 120 of 181
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2018
-
Mark
Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code
2018)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Evaluating Security of Software Through Vulnerability Metrics
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Error Amplification in Code-based Cryptography
2018) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2019(1). p.238-258(
- Contribution to journal › Article
-
Mark
Optimization of message encryption for real-time applications in embedded systems
(
- Contribution to journal › Article
- 2017
-
Mark
Interactive data representation migration: exploiting program dependence to aid program transformation
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Hierarchical Self-Organizing Maps System for Action Classification
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Resource Management in Computing Systems
2017)(
- Thesis › Licentiate thesis
-
Mark
Application of full-reference video quality metrics in IPTV
2017) 12th IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, BMSB 2017(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Hemlig dataavläsning kan hota vår cybersäkerhet
2017) In Ny teknik(
- Contribution to specialist publication or newspaper › Newspaper article
-
Mark
Evaluating a Dynamic Keep-Alive Messaging Strategy for Mobile Pervasive Systems
2017) The 8th International Conference on Ambient Systems, Networks and Technologies In Procedia Computer Science 109. p.319-326(
- Contribution to journal › Article