Operating Systems Security (2014 Year in Review), Part 3 |
|
Hard Problems: Scalability and Composability (2014 Year in Review) |
|
Hard Problems: Predictive Security Metrics (ACM) |
|
Hard Problems: Predictive Security Metrics (IEEE) |
|
Citations for Hard Problems (2014 Year in Review) |
|
Phishing (IEEE) (2014 Year in Review), Part 1 |
|
Phishing (IEEE) (2014 Year in Review), Part 2 |
|
Phishing (ACM) (2014 Year in Review) |
|
Elliptic Curve Cryptography from ACM, 2014, Part 1 |
|
Elliptic Curve Cryptography from ACM, 2014, Part 2 |
|
Software Security, 2014 (IEEE), Part 1 |
|
Software Security, 2014 (IEEE), Part 2 |
|
Software Security, 2014 (ACM), Part 1 |
|
Software Security, 2014 (ACM), Part 2 |
|
Malware Analysis, Part 1 |
|
Malware Analysis 2014, Part 1 (ACM) |
|
Malware Analysis, 2014, Part 2 (ACM) |
|
Internet of Things Security Problems |
|
Trustworthy Systems, Part 1 |
|
Trustworthy Systems, Part 2 |
|
Journal: IEEE Transactions on Information Forensics and Security, March 2015 |
|
Security Conference Publications, Early 2015 |
|
Cryptology and Data Security, 2014 |
|
Smart Grid Security |
|
Coding Theory and Security, 2014, Part 1 |
|