31 results on '"Ko, Ryan K L"'
Search Results
2. Evasion Attack and Defense on Machine Learning Models in Cyber-Physical Systems: A Survey.
3. Crime script analysis for adult image-based sexual abuse: a study of crime intervention points for retribution-style offenders
4. Message from the guest editors
5. Positive-Unlabeled Learning using Random Forests via Recursive Greedy Risk Minimization
6. Realizing credible remote agricultural auditing with trusted video technology.
7. Multiscale Adaptive Multifractal Detrended Fluctuation Analysis-Based Source Identification of Synchrophasor Data.
8. Cyber Autonomy: Automating the Hacker- Self-healing, self-adaptive, automatic cyber defense systems and their impact to the industry, society and national security
9. Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools
10. An exploratory study of organizational cyber resilience, its precursors and outcomes.
11. Source Authentication of Distribution Synchrophasors for Cybersecurity of Microgrids.
12. Differentially Private Collaborative Coupling Learning for Recommender Systems.
13. General Data Protection Regulation (GDPR) in Healthcare: Hot Topics and Research Fronts.
14. Computing Mod with a Variable Lookup Table.
15. A Global, Empirical Analysis of the Shellshock Vulnerability in Web Applications.
16. Trusted Tamper-Evident Data Provenance.
17. A Joint Optimization Approach to Security-as-a-Service Allocation and Cyber Insurance Management.
18. Bin Encoding: A User-Centric Secure Full-Text Searching Scheme for the Cloud.
19. STRATUS: Towards Returning Data Control to Cloud Users.
20. End-to-End Secure and Privacy Preserving Mobile Chat Application.
21. Consumer-centric protection for online social networks.
22. Data Accountability in Cloud Systems.
23. Security and Privacy in Smart Cities.
24. Formal Concept Discovery in Semantic Web Data.
25. Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments.
26. A computer scientist's introductory guide to business process management (BPM).
27. Crime script analysis for adult image-based sexual abuse: a study of crime intervention points for retribution-style offenders.
28. Special issue on trust and security in cloud computing.
29. Message from TSCloud Symposium Chairs.
30. Cloud computing in plain English.
31. Editorial: Human-Centric Security and Privacy.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.