187 results on '"Shin, Dongwan"'
Search Results
52. Formation of Single-Layered Pt Islands on Au(111) Using Irreversible Adsorption of Pt and Selective Adsorption of CO to Pt
53. Session details: Volume I: Artificial intelligence & agents, distributed systems, and information systems: smart grid and smart technologies track
54. Editorial
55. Advanced technologies for homeland defense and security
56. Detection of Plugin Misuse Drive-By Download Attacks using Kernel Machines
57. Detection of shellcodes in drive-by attacks using kernel machines
58. Towards preventing QR code based attacks on android phone using security warnings
59. Supporting visual security cues for WebView-based Android apps
60. Session details: Volume I: Artificial intelligence & agents, distributed systems, and information systems: smart grids and smart technologies track
61. Towards Multi-policy Support for IaaS Clouds to Secure Data Sharing
62. Detection of plugin misuse drive-by download attacks using kernel machines.
63. HLS-dv: A High-Level Synthesis Framework for Dual-Vdd Architectures
64. A policy-based decentralized authorization management framework for cloud computing
65. Similarity Analysis of Shellcodes in Drive-by Download Attack Kits
66. An empirical study of visual security cues to prevent the SSLstripping attack
67. Enhancing directory virtualization to detect insider activity
68. Formal analysis of device authentication applications in ubiquitous computing
69. Detecting insider activity using enhanced directory virtualization
70. Towards Secure Virtual Directories: A Risk Analysis Framework
71. Permission Management System: Permission as a Service in Cloud Computing
72. A framework for risk analysis in virtual directory security
73. A group-based security policy for wireless sensor networks
74. Domain-based virtualized resource management in cloud computing
75. Estimation for the autoregressive moving average model with a unit root
76. Secure device pairing using audio
77. Threat modeling for virtual directory services
78. Statistical retention modeling in floating-gate cell: ONO scaling
79. Authenticated Dictionary-Based Attribute Sharing in Federated Identity Management
80. An opensocial extension for enabling user-controlled persona in online social networks
81. A Framework for Enabling User-Controlled Persona in Online Social Networks
82. An Interactive Design Environment for C-Based High-Level Synthesis of RTL Processors
83. Towards Privacy in Enterprise Directory Services: A User-Centric Approach to Attribute Management
84. Automatic Layer-Based Generation of System-On-Chip Bus Communication Models
85. Towards secure resource sharing for impromptu collaboration in pervasive computing
86. A Visual Framework for Securing Impromptu Collaboration in Pervasive Computing
87. Automatic generation of transaction level models for rapid design space exploration
88. Mobile-driven architecture for managing enterprise security policies
89. Towards multi-policy support for IaaS clouds to secure data sharing.
90. Automatic network generation for system-on-chip communication design
91. VISUAL DEVICE IDENTIFICATION FOR SECURITY SERVICES IN AD-HOC WIRELESS NETWORKS
92. System-level communication modeling for network-on-chip synthesis
93. An empirical study of visual security cues to prevent the SSLstripping attack.
94. On modeling system-centric information for role engineering
95. Automatic communication refinement for system level design
96. A role administration system in role-based authorization infrastructures
97. An Interactive Design Environment for C-based High-Level Synthesis.
98. Automatic generation of transaction level models for rapid design space exploration.
99. An Efficient Scheme for User-controlled Attribute Sharing in Federated Identity
100. Automatic network generation for system-on-chip communication design.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.