Host Inventory Controls And Systems Survey: Evaluating The Cis Critical Security Control One In Higher Education Networks | 0 | 0.34 | 2018 |
Privacy Preserving Network Security Data Analytics: Architectures And System Design | 0 | 0.34 | 2018 |
Changing the Game: A Micro Moving Target IPv6 Defense for the Internet of Things. | 1 | 0.36 | 2018 |
Designing a Micro-Moving Target IPv6 Defense for the Internet of Things. | 2 | 0.47 | 2017 |
MARCS: mobile augmented reality for cybersecurity | 0 | 0.34 | 2017 |
System architectural design of a hardware engine for moving target IPv6 defense over IEEE 802.3 Ethernet. | 0 | 0.34 | 2017 |
Spark on the ARC: Big data analytics frameworks on HPC clusters. | 0 | 0.34 | 2017 |
Strengthening MT6D Defenses with LXC-Based Honeypot Capabilities | 0 | 0.34 | 2016 |
Modeling network based moving target defense impacts through simulation in Ns-3. | 0 | 0.34 | 2016 |
Speed isn?t Enough: Usability and Adoption of an Optimized Alert Notification System. | 0 | 0.34 | 2016 |
Attention: moving target defense networks, how well are you moving? | 2 | 0.38 | 2015 |
Energy efficiency of Zipf traffic distributions within Facebook's data center fabric architecture | 2 | 0.37 | 2015 |
DHT Blind Rendezvous for Session Establishment in Network Layer Moving Target Defenses | 3 | 0.49 | 2015 |
Implementing moving target IPv6 defense to secure 6LoWPAN in the internet of things and smart grid | 4 | 0.44 | 2014 |
Leveraging Cognitive Principles to Improve Security Visualization. | 1 | 0.36 | 2012 |
Developing a plug-in tool to make OneNote an e-textbook | 2 | 0.45 | 2012 |
Validating A Custom Ipv6 Security Application Using Opnet Modeler | 0 | 0.34 | 2012 |
Cover-VT: Converged Security Visualization Tool | 1 | 0.34 | 2011 |
What DHCPv6 says about you | 4 | 0.50 | 2011 |
Mini workshop — How to improve teaching and learning: Selecting, implementing and evaluating digital resources in the Engineering Pathway | 0 | 0.34 | 2011 |
Mt6d: A Moving Target Ipv6 Defense | 40 | 1.90 | 2011 |
Simulating the Deployment of Battery-Sensing Intrusion Protection Systems | 0 | 0.34 | 2009 |
WriteOn1.0: a tablet PC-based tool for effective classroom instruction | 3 | 0.49 | 2009 |
Mobile Device Profiling and Intrusion Detection Using Smart Batteries | 34 | 2.59 | 2008 |
Internet Security: Intrusion Detection and Prevention in Mobile Systems | 1 | 0.37 | 2007 |
Facilitating Pedagogical Practices through a Large-Scale Tablet PC Deployment | 3 | 0.50 | 2007 |
Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack Detection | 5 | 0.84 | 2007 |
Ubiquitous Security: Privacy versus Protection | 3 | 0.62 | 2006 |
WriteOn: a tool for classroom presentations on tablet PCs | 1 | 0.76 | 2006 |
Modeling Security Vulnerabilities: A Constraints and Assumptions Perspective | 4 | 0.54 | 2006 |
Internet Security: Intrusion Detection and Prevention: Minitrack Introduction | 2 | 0.40 | 2004 |
Implementation Issues on the Quality Evaluation ofWeb-Based Courses and Digital Learning Resources | 0 | 0.34 | 2004 |
CANDI: A System for Classifying the Security Risks in Network Appliances | 0 | 0.34 | 2003 |
Design and Implementation of a Configurable Platform for Embedded Communication Systems | 2 | 0.46 | 2003 |
A Development System for Creating Real-time Machine Vision Hardware Using Field Programmable Gate Arrays | 2 | 0.47 | 1999 |
FX: a fast approximate fault simulator for the switch-level using VHDL | 1 | 0.35 | 1996 |
VHDL switch level fault simulation | 1 | 0.36 | 1994 |
A Programmable MIDI Instrument Controller Emulating a Hammer Dulcimer. | 0 | 0.34 | 1992 |
BIDES: a BIST design expert system | 4 | 0.77 | 1991 |
Automatic insertion of BIST hardware using VHDL | 13 | 2.14 | 1988 |
Parallel Computer Architectures and Problem Solving Strategies for the Consistent Labeling Problem | 8 | 2.53 | 1985 |