Search Results
22. Security Engineering of Hardware-Software Interfaces
23. Simulated User Bots: Real Time Testing of Insider Threat Detection Systems
24. Enhanced Instruction Set Randomization Design Space Exploration
25. Introduction to Security for Computer Architecture Students
26. Machine Learning Based User Modeling for Enterprise Security and Privacy Risk Mitigation
27. Repurposing Software Defenses with Specialized Hardware
28. Symbolic Model Learning: New Algorithms and Applications
29. A Secure and Formally Verified Commodity Multiprocessor Hypervisor
30. Bespoke Security for Resource Constrained Cyber-Physical Systems
- « Previous
- Next »
- 1
- 2
- 3
- 4