Buscar
Mostrando ítems 1-10 de 1353
A Probabilistic Logic of Cyber Deception
(Institute of Electrical and Electronics Engineers, 2017-11)
Malicious attackers often scan nodes in a network in order to identify vulnerabilities that they may exploit as they traverse the network. In this paper, we propose that the system generates a mix of true and false answers ...
Security in smart objects, a general view at the physical and logical level
(Editorial de la Universidad Tecnica del Norte, 2019)
FORTUNA-A framework for the design and development of hardware-based secure systems
(Elsevier Science IncNew YorkEUA, 2013)
Offloading personal security applications to the Network Edge: a mobile user case scenario
(Institute of Electrical and Electronics Engineers, 2016)
Corporate security governance and the “intrinsic logic” of Rio de Janeiro and São PauloCorporate security governance and the “intrinsic logic” of Rio de Janeiro and São Paulo
(Pontificia Universidad Católica Argentina, 2017)