18 results on '"Ko, Ryan K L"'
Search Results
2. Crime script analysis for adult image-based sexual abuse: a study of crime intervention points for retribution-style offenders
3. Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges.
4. Realizing credible remote agricultural auditing with trusted video technology.
5. Multiscale Adaptive Multifractal Detrended Fluctuation Analysis-Based Source Identification of Synchrophasor Data.
6. An exploratory study of organizational cyber resilience, its precursors and outcomes.
7. Source Authentication of Distribution Synchrophasors for Cybersecurity of Microgrids.
8. Differentially Private Collaborative Coupling Learning for Recommender Systems.
9. General Data Protection Regulation (GDPR) in Healthcare: Hot Topics and Research Fronts.
10. A Global, Empirical Analysis of the Shellshock Vulnerability in Web Applications.
11. Trusted Tamper-Evident Data Provenance.
12. A Joint Optimization Approach to Security-as-a-Service Allocation and Cyber Insurance Management.
13. Bin Encoding: A User-Centric Secure Full-Text Searching Scheme for the Cloud.
14. Consumer-centric protection for online social networks.
15. Security and Privacy in Smart Cities.
16. Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments.
17. Crime script analysis for adult image-based sexual abuse: a study of crime intervention points for retribution-style offenders.
18. Message from TSCloud Symposium Chairs.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.