Your selections:
Utilizing QR codes to verify the visual fidelity of image datasets for machine learning
- Chow, Yang-Wai, Susilo, Willy, Wang, Jianfeng, Buckland, Richard, Baek, Joonsang, Kim, Jongkil, Li, Nan
Policy-based access control for constrained healthcare resources in the context of the Internet of Things
- Pal, Shantanu, Hitchens, Michael, Varadharajan, Vijay, Rabehaja, Tahiry
Intrusion detection techniques in cloud environment: A survey
- Mishra, Preeti, Pilli, Emmanuel S., Varadharajan, Vijay, Tupakula, Udaya
Counteracting security attacks in virtual machines in the cloud using property based attestation
- Varadharajan, Vijay, Tupakula, Udaya
Are you sure you would like to clear your session, including search history and login status?