Search Results

Filter
  • 1-10 of  16 results for ""JOHNS Hopkins University. Information Security Institute""
Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Conference

Securing commercial WiFi-based UAVs from common security attacks.

  • Source: MILCOM 2016 - 2016 IEEE Military Communications Conference; 2016, p1213-1218, 6p

Record details

×
Conference

Collaborative detection of Covert Storage Channels.

  • Source: MILCOM 2016 - 2016 IEEE Military Communications Conference; 2016, p515-520, 6p

Record details

×
Conference

Table of contents.

  • Source: MILCOM 2016 - 2016 IEEE Military Communications Conference; 2016, p1-27, 27p

Record details

×
Conference

Program.

  • Source: MILCOM 2016 - 2016 IEEE Military Communications Conference; 2016, p1-24, 24p

Record details

×
Conference

Committees.

  • Source: 2015 IEEE 21st International Conference on Embedded & Real-Time Computing Systems & Applications; 2015, p1-12, 12p

Record details

×
Conference

Remotely inferring device manipulation of industrial control systems via network behavior.

  • Source: 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops); 2015, p603-610, 8p

Record details

×
Conference

Technical program of LCN 2015 and adjunct workshops.

  • Source: 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops); 2015, p1-25, 25p

Record details

×
Conference

Technical program of LCN 2015 and adjunct workshops.

  • Source: 2015 IEEE 40th Conference on Local Computer Networks (LCN); 2015, p1-25, 25p

Record details

×
Academic Journal

Developers are Not the Enemy!: The Need for Usable Security APIs.

  • Source: IEEE Security & Privacy; Sep2016, Vol. 14 Issue 5, p40-46, 7p

Record details

×
Academic Journal

Silver Bullet Talks with Steven M. Bellovin and Matthew Green.

  • Source: IEEE Security & Privacy; Nov2015, Vol. 13 Issue 6, p12-15, 4p

Record details

×
  • 1-10 of  16 results for ""JOHNS Hopkins University. Information Security Institute""