Title Date
Coding Theory and Security, 2014, Part 2
Coding Theory and Security, 2014, Part 3
Malware Analysis, Part 2
Malware Analysis, Part 3
Malware Analysis, Part 4
Malware Analysis, Part 5
International Conferences: Computer Security Applications Conference, December 2014, New Orleans, Part 1
International Conferences: Computer Security Applications Conference, December 2014, New Orleans, Part 2
International Conferences: Innovations in Theoretical Computer Science, Israel, 2015
Deterrence
Deterrence, 2014 (ACM Publications)
International Conferences: Signal Processing, Informatics, Communication & Energy Systems (SPICES), India, 2015
International Conferences: Information Networking (ICOIN), 2015, Cambodia
International Conferences: Signal Processing and Integrated Networks (SPIN), 2015
International Conferences: The Third International Conference on Computer, Communication, Control and Information Technology (C3IT), 2015, India
International Conferences: Information Theory Workshop (ITW), 2014, Hobart, Tasmania
Dynamical Systems, 2014
End to End Security and the Internet of Things, 2014
End to End Security and IPv6, 2014
Privacy Models, 2014
Privacy Models, 2015
Open Systems and Security, 2014
Peer to Peer Security, 2014
Multicore Computing and Security, 2014
Fog Computing Security