Search Constraints
Search Results
Select an image to start the slideshow
5G-to-Next-G: Prototyping Cellular Networks Using Software Radio
1 of 31
Mitigating Temporal Memory Safety Errors in the Linux Kernel
2 of 31
Contact Tracing for the COVID-19 Pandemic
3 of 31
SDN-Controlled Isolation Orchestration
4 of 31
Security in Isolated Environments: Determining Intuitive Features for Standard Computer Users
5 of 31
PCB Verification using a Built-in FPGA Security Monitoring IP
6 of 31
Internal Cognitive Assurance Model for Autonomous Robotic Systems (ICAMARS)
7 of 31
Protecting Model Confidentiality for Machine Learning as a Service
8 of 31
Internet Privacy Implications
9 of 31
Vulnerabilities of Multi-factor Authentication in Modern Computer Networks
10 of 31
Safeguarding the Online Presence of LGBTIQ Refugees
11 of 31
SentryEye: A Vehicle Security Device
12 of 31
SentryEye: A Vehicle Security Device
13 of 31
Ballistocardiography-based Authentication using Convolutional Neural Networks
14 of 31
Side-Channel Attacks on Intel SGX: How SGX Amplifies The Power of Cache Attack
15 of 31
Software-defined Networking: Improving Security for Enterprise and Home Networks
16 of 31
The Dynamics of ISIS: An Emerging-State Actor
17 of 31
Implicit Cache Lockdown on ARM: An Accidental Countermeasure to Cache-Timing Attacks
18 of 31
µLeech: A Side-Channel Evaluation Platform for Next Generation Trusted Embedded Systems
19 of 31
An Investigation of Security in Near Field Communication Systems
20 of 31
Leveraging Software-Defined Networking and Virtualization for a One-to-One Client-Server Model
21 of 31
First-Order Models for Configuration Analysis
22 of 31
Secure and Reliable Data Outsourcing in Cloud Computing
23 of 31
User-Centric Security and Privacy Mechanisms in Untrusted Networking and Computing Environments
24 of 31
Privacy-Preserving Personal Health Record System Using Attribute-Based Encryption
25 of 31
Opportunistic Routing in Multihop Wireless Networks: Capacity, Energy Efficiency, and Security
26 of 31
Noninterference in Concurrent Game Structures
27 of 31
Pricing Security Derivatives under the Forward Measure
28 of 31
Communication Security in Wireless Sensor Networks
29 of 31
The Wisdom of Crowds as a Model for Trust and Security in Peer Groups
30 of 31
Trade-offs Between Energy and Security in Wireless Networks
31 of 31