Ajax loader
By using our website, you agree to our use of cookies as described in Cookie Policy
 For more images, please select "images" in the filters.
Security and privacy in information processing
PDF
Optimizing privacy and performance in spectrum access systems
PDF
Cooperation in wireless networks with selfish users
PDF
Distributed resource management for QoS-aware service provision
PDF
Traffic assignment models for a ridesharing transportation market
PDF
Pdf
Software security economics and threat modeling based on attack path analysis; a stakeholder value driven approach
00001.tif
PDF
PDF
PDF
PDF
PDF
Microsoft Word - timmons_dissertation_final.docx
PDF
PDF
PDF
Microsoft Word - OkaiteyePaul Final Manuscript.docx
PDF