Cited By
View all- Garg SSingh RMohapatra A(2019)Analysis of software vulnerability classification based on different technical parametersInformation Security Journal: A Global Perspective10.1080/19393555.2019.162832528:1-2(1-19)Online publication date: 14-Jun-2019
- Fossati TGurbani VKolesnikov VBenson TRaiciu C(2015)Love All, Trust FewProceedings of the 2015 ACM SIGCOMM Workshop on Hot Topics in Middleboxes and Network Function Virtualization10.1145/2785989.2785990(1-6)Online publication date: 21-Aug-2015
- Bickford JGiura P(2015)Safe Internet Browsing Using a Transparent Virtual BrowserProceedings of the 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud)10.1109/CSCloud.2015.58(423-432)Online publication date: 3-Nov-2015