Publications
Search results
Jump to search filtersExploring security implications of the cloud
Peering Through the Haze: Privacy and Monitoring in the Cloud Computing Paradigm
Peering Through the Haze: Privacy and Monitoring in the Cloud Computing Paradigm
Utilizing Linear Algebra Subspaces to Improve Cloud Security
Clones: Underlying Patterns throughout the Software Lifecycle
Investigating the effectiveness of many-core network processors for high performance cyber protection systems. Part I, FY2011
Removing the Blinders: Using Information to Mitigate Adversaries in Adaptive Overlays
Removing the Blinders: Using Information to Mitigate Adversaries in Adaptive Overlays
Results 26–34 of 34