Search
Now showing items 1-10 of 218
Protecting the mobile enterprise
Publisher: IET
Year: 2014
Hardware Trojans: current challenges and approaches
Publisher: IET
Year: 2014
Can Malware Be Exterminated by Better Understanding Its Roots?
Publisher: IEEE
Year: 2014
Robotic System for Imagery-Guided Surgery [Industrial Activities]
Publisher: IEEE
Year: 2014
Cloud Data Management for Scientific Workflows: Research Issues, Methodologies, and State-of-the-Art
Publisher: IEEE
Year: 2014
Smartphone Malware and Its Propagation Modeling: A Survey
Publisher: IEEE
Year: 2014
Analysis of Bayesian classification-based approaches for Android malware detection
Publisher: IET
Year: 2014
Malware detection method based on the control-flow construct feature of software
Publisher: IET
Year: 2014
Low power nonlinear Min/Max filters implemented in the CMOS technology
Publisher: IEEE
Year: 2014