Search results
IEEE Security & Privacy > 2017 > 15 > 4 > 85 - 87
IEEE Security & Privacy > 2017 > 15 > 1 > 3 - 4
IEEE Security & Privacy > 2015 > 13 > 5 > 96 - 98
IT Professional > 2013 > 15 > 4 > 38 - 42
IEEE Transactions on Dependable and Secure Computing > 2010 > 7 > 4 > 381 - 395
IEEE Transactions on Dependable and Secure Computing > 2009 > 6 > 2 > 96 - 110
IEEE Transactions on Dependable and Secure Computing > 2008 > 5 > 1 > 49 - 61
IEEE Transactions on Dependable and Secure Computing > 2008 > 5 > 4 > 224 - 241
2007 44th ACM/IEEE Design Automation Conference > 268 - 269
IEEE Control Systems Letters > 2018 > 2 > 2 > 195 - 200
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 621 - 636
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 802 - 817
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 671 - 684
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 773 - 787
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 695 - 705
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 545 - 558