Skip navigation

Browsing by Subject security

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 2 of 2
Issue DateTitleAuthor(s)
2022Survey, taxonomy, and methods of QCA-based design techniques - Part II: Reliability and securityFazili M.M.; Shah M.F.; Naz S.F.; Shah A.P.
2020Vulvet: Vetting of Vulnerabilities in Android Apps to Thwart ExploitationGajrani J.; Tripathi M.; Laxmi V.; Somani G.; Zemmari A.; Gaur M.S.