Ajax loader
By using our website, you agree to our use of cookies as described in Cookie Policy
 For more images, please select "images" in the filters.
Dynamic graph analytics for cyber systems security applications
PDF
Defending industrial control systems: an end-to-end approach for managing cyber-physical risk
PDF
Using telemetry to ensure safe and reliable medical device operation: experience with defibrillators and infusion pumps
PDF
Adaptive and resilient stream processing on cloud infrastructure
PDF
Novel and efficient schemes for security and privacy issues in smart grids
PDF
The relationship between school factors and the prevalence of bullying amongst middle school students
PDF
Emerging technology and its impact on security policy
PDF
Crimean promises: how Alexander Vinnik became the ultimate trophy in a blockchain Cold War
PDF
Model-driven situational awareness in large-scale, complex systems
PDF
Modeling dynamic behaviors in the wild
PDF
Sequential detection with applications to detection of network intrusions
PDF
GeosocialFootprint (2103): social media location privacy Web map
PDF
Trade-offs among attributes of authentication
PDF
A family affair: the role of parenting style, parental supervision, and family composition as explanatory factors for bullying
PDF
PDF
PDF
PDF
PDF
PDF
PDF
PDF
PDF
PDF
PDF
PDF