Uploads
Contact
/
Login
Upload
Search Results for 'Security Flow'
Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative
lindy-dunigan
Corralling APEX Applications
phoebe-click
VEX: Vetting browser extensions for security vulnerabilitie
briana-ranney
SPHINX: Detecting Security Attacks in Software-Defined Netw
kittie-lecroy
direct pedestrian flow, and create safety barriers between pedestriana
karlyn-bohler
Probabilistic Computation for Information Security
cheryl-pisano
SDN & Security
faustina-dinatale
Supporting Security at the Gate Level:
cheryl-pisano
Security Models
liane-varnes
Security Models
myesha-ticknor
On-Chip Control Flow Integrity Check for
briana-ranney
SDN and Security
tawny-fly
End-to-End Verification of Information-Flow Security for
aaron
End-to-End Verification of Information-Flow Security for
tawny-fly
Examination of the Interplay of Reliability and Security us
phoebe-click
Cyber Security of SCADA Systems
tatiana-dople
Information Flow Control and Audit
conchita-marotz
Power Flow Power Flow Power Flow The Optimal Power Flow module is an intelligent load
trish-goza
Experimental Evaluation
debby-jeon
Laminar: Practical Fine-Grained Decentralized Information F
pamella-moone
Modern Systems: Security
tatiana-dople
Information Flow Control
yoshiko-marsland
Engineers are People Too
luanne-stotts
An Information Flow
yoshiko-marsland
1
2
3
4
5
6