Security thread

Results: 66



#Item
1A Taxonomy for the Security Assessment of IPbased Building Automation Systems: The Case of Thread Yu Liu, Zhibo Pang and Gyorgy Dan The self-archived postprint version of this journal article is available at Linköping U

A Taxonomy for the Security Assessment of IPbased Building Automation Systems: The Case of Thread Yu Liu, Zhibo Pang and Gyorgy Dan The self-archived postprint version of this journal article is available at Linköping U

Add to Reading List

Source URL: liu.diva-portal.org

Language: English - Date: 2018-06-13 10:30:04
    2A Logic of Secure Systems and its Application to Trusted Computing Anupam Datta Jason Franklin  Deepak Garg

    A Logic of Secure Systems and its Application to Trusted Computing Anupam Datta Jason Franklin Deepak Garg

    Add to Reading List

    Source URL: www.cs.cmu.edu

    Language: English - Date: 2009-06-02 14:26:22
    3Concurrency Attacks Junfeng Yang, Ang Cui, Sal Stolfo, Simha Sethumadhavan {junfeng, ang, sal, simha}cs.columbia.edu Department of Computer Science Columbia University

    Concurrency Attacks Junfeng Yang, Ang Cui, Sal Stolfo, Simha Sethumadhavan {junfeng, ang, sal, simha}cs.columbia.edu Department of Computer Science Columbia University

    Add to Reading List

    Source URL: www.cs.columbia.edu

    Language: English - Date: 2016-01-23 22:11:32
    4CS240 Operating Systems Midterm Exam Review – Feb. 8, 2013 Your Name: SUNet ID:

    CS240 Operating Systems Midterm Exam Review – Feb. 8, 2013 Your Name: SUNet ID:

    Add to Reading List

    Source URL: www.scs.stanford.edu

    Language: English - Date: 2013-02-09 14:29:53
    5System design issues • Systems often have many goals: - Performance, reliability, availability, consistency, scalability, security, versatility, modularity/simplicity  • Designers face trade-offs:

    System design issues • Systems often have many goals: - Performance, reliability, availability, consistency, scalability, security, versatility, modularity/simplicity • Designers face trade-offs:

    Add to Reading List

    Source URL: www.scs.stanford.edu

    Language: English - Date: 2006-12-07 12:00:26
    62011 IEEE Symposium on Security and Privacy  Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach  Vineeth Kashyap

    2011 IEEE Symposium on Security and Privacy Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach Vineeth Kashyap

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2011-04-10 18:07:04
    7Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection

    Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection

    Add to Reading List

    Source URL: ieee-security.org

    Language: English - Date: 2012-05-22 01:36:04
    8

    PDF Document

    Add to Reading List

    Source URL: www.frbservices.org

    Language: English - Date: 2013-06-04 11:15:48
    9WiFi and Thread Similarities and Benefits for the Networking Community Recently Google/Nest, together with Samsung, ARM, Yale Security and others, announced “Thread” perceived by some as a new standard for the Smart

    WiFi and Thread Similarities and Benefits for the Networking Community Recently Google/Nest, together with Samsung, ARM, Yale Security and others, announced “Thread” perceived by some as a new standard for the Smart

    Add to Reading List

    Source URL: www.greenpeak.com

    Language: English - Date: 2015-03-25 12:24:57
    10A Brief Overview on L4.Sec

    A Brief Overview on L4.Sec

    Add to Reading List

    Source URL: os.inf.tu-dresden.de

    Language: English - Date: 2005-10-19 09:30:31