Found: 5
Select item for more details and to access through your institution.
Threat Modeling for Cloud Infrastructures.
- Published in:
- EAI Endorsed Transactions on Security & Safety, 2018, v. 5, n. 17, p. 1, doi. 10.4108/eai.10-1-2019.156246
- By:
- Publication type:
- Article
Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach.
- Published in:
- EAI Endorsed Transactions on Security & Safety, 2018, v. 5, n. 17, p. 1, doi. 10.4108/eai.10-1-2019.156245
- By:
- Publication type:
- Article
Secure Communication in VANET Broadcasting.
- Published in:
- EAI Endorsed Transactions on Security & Safety, 2018, v. 5, n. 17, p. 1, doi. 10.4108/eai.10-1-2019.156243
- By:
- Publication type:
- Article
Bridging the Gap Between Security Tools and SDN Controllers.
- Published in:
- EAI Endorsed Transactions on Security & Safety, 2018, v. 5, n. 17, p. 1, doi. 10.4108/eai.10-1-2019.156242
- By:
- Publication type:
- Article
BluePass: A Mobile Device Assisted Password Manager.
- Published in:
- EAI Endorsed Transactions on Security & Safety, 2018, v. 5, n. 17, p. 1, doi. 10.4108/eai.10-1-2019.156244
- By:
- Publication type:
- Article