Search Constraints
Search Results
Select an image to start the slideshow
Warden: Multi-Layered Control Flow Integrity in Web Applications
1 of 29
Mobile Device Software-Defined Networking
2 of 29
Systems and Network Optimization
3 of 29
SDN-Controlled Isolation Orchestration
4 of 29
Few-Shot Machine Learning for Side-Channel Analysis
5 of 29
Managing Isolated VMs in Qubes
6 of 29
Security in Isolated Environments: Determining Intuitive Features for Standard Computer Users
7 of 29
Ultrafork and Focused KSM: Tools for Memory Optimization in Duplicate Containers
8 of 29
SDN-Controlled Isolation Orchestration to Support End-User Autonomy
9 of 29
Evaluation of a Social Media Bot Detector for integration into MITRE SP!CE™
10 of 29
Vulnerabilities of Multi-factor Authentication in Modern Computer Networks
11 of 29
Prefetcher Optimization
12 of 29
Graceful Degradation in IoT Security
13 of 29
Developing Single Use Server Containers
14 of 29
Securing IoT Networks Through Specification-Based IDS/IPS
15 of 29
Securing IoT Networks Through Specification and Encryption
16 of 29
Enhancing ACLs with Host-Context
17 of 29
Enhancing Plug and Play Capabilities in Body Area Network Protocols
18 of 29
Host-Based Traffic Engineering: Network Endpoints with the Capabilities of SDN-Enabled Switches
19 of 29
Influence of End User Activity on Firewalling Decisions
20 of 29
Insider Threat Detection with Text Libraries and Machine Learning
21 of 29
Kernel Integrity Analysis
22 of 29
Next Gen Firewalls: An Investigation into the Impact of User Activity Context on Firewall Administration
23 of 29
System Level Design of Software-Defined Radio Platform
24 of 29
The Big Picture: Using Desktop Imagery for Detection of Insider Threats
25 of 29
Trusted Execution Development: Designing a Secure, High-Performance Remote Attestation Protocol
26 of 29
Virtual Machine Server Management Tools
27 of 29
Windows GUI Context Extraction
28 of 29
Wireless Bandwidth Aggregation for Internet Traffic
29 of 29