87 results on '"Shin, Dongwan"'
Search Results
2. On Log Analysis and Stack Trace Use to Improve Program Slicing
3. A Mapping Study on Privacy Attacks in Big Data and IoT
4. Ontology-based user privacy management in smart grid
5. Session details: Theme: System software and security: IoT - Internet of things track
6. Differential privacy applied to smart meters
7. Behavior control-based approach to influencing user's cybersecurity actions using mobile news app
8. Key Establishment Using Group Information for Wireless Sensor Networks
9. Enabling Interoperable and Selective Data Sharing among Social Networking Sites
10. Protecting Sensitive Information in Directory Services Using Virtual Directories
11. Failure Prediction by Utilizing Log Analysis
12. On Matching Log Analysis to Source Code
13. On Vulnerability and Security Log analysis
14. On Code Analysis Opportunities and Challenges for Enterprise Systems and Microservices
15. Role-Based Privilege Management Using Attribute Certificates and Delegation
16. Information Assurance in Federated Identity Management: Experimentations and Issues
17. Using X.509 Attribute Certificates for Role-Based EAM
18. Network Intrusion Detection in Smart Grids for Imbalanced Attack Types Using Machine Learning Models
19. Developing a mental model for use in the context of computer security
20. An Empirical Study of SSL Usage in Android Apps
21. An efficient approach to securing user data in android
22. Development of Carbon Continuous-fiber Composite Frame for Automotive Sun-roof Assembly
23. Virtual machine scheduling based on task characteristic
24. Session details: Volume II: Software design and development, and system software and security: Smart grid and smart technologies track
25. A novel device for secure home E-voting
26. An enhanced approach to preventing the SSLstripping attack
27. SRC-Stat Package for Fitting Double Hierarchical Generalized Linear Models
28. Survival Analysis using SRC-Stat Statistical Package
29. Session details: Volume II: Software development, system software and security: Smart grid and smart technologies track
30. An Interactive Design Environment for C-based High-Level Synthesis
31. AUTOMATIC GENERATION OF COMMUNICATION ARCHITECTURES
32. Session details: Session 9B -- Crypto Implementations
33. Formic Acid Oxidation Depending on Rotating Speed of Smooth Pt Disk Electrode
34. Formic Acid Oxidation Depending on Rotating Speed of Smooth Pt Disk Electrode
35. Guest Editors' Introduction: Special Issue on Security and Privacy in Mobile Platforms
36. Formation of Single-Layered Pt Islands on Au(111) Using Irreversible Adsorption of Pt and Selective Adsorption of CO to Pt
37. Session details: Volume I: Artificial intelligence & agents, distributed systems, and information systems: smart grid and smart technologies track
38. Editorial
39. Advanced technologies for homeland defense and security
40. Detection of Plugin Misuse Drive-By Download Attacks using Kernel Machines
41. Detection of shellcodes in drive-by attacks using kernel machines
42. Towards preventing QR code based attacks on android phone using security warnings
43. Supporting visual security cues for WebView-based Android apps
44. Session details: Volume I: Artificial intelligence & agents, distributed systems, and information systems: smart grids and smart technologies track
45. Towards Multi-policy Support for IaaS Clouds to Secure Data Sharing
46. HLS-dv: A High-Level Synthesis Framework for Dual-Vdd Architectures
47. A policy-based decentralized authorization management framework for cloud computing
48. Similarity Analysis of Shellcodes in Drive-by Download Attack Kits
49. An empirical study of visual security cues to prevent the SSLstripping attack
50. Toward role-based provisioning and access control for infrastructure as a service (IaaS)
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.