Your selections:
Techniques for enhancing security in industrial control systems
- Varadharajan, Vijay, Tupakula, Uday, Karmakar, Kallol Krishna
Software Enabled Security Architecture and Mechanisms for Securing 5G Network Services
- Varadharajan, Vijay, Tupakula, Uday, Karmakar, Kallol Krishna
Techniques for securing 5G network services from attacks
- Varadharajan, Vijay, Tupakula, Uday, Karmakar, Kallol Krishna
Techniques for Securing Control Systems from Attacks
- Tupakula, Uday, Varadharajan, Vijay, Karmakar, Kallol Krishna
Towards a security enhanced virtualised network infrastructure for internet of medical things (IoMT)
- Karmakar, Kallol Krishna, Varadharajan, Vijay, Tupakula, Uday, Nepal, Surya, Thapa, Chandra
Counteracting attacks from malicious end hosts in software defined networks
- Varadharajan, Vijay, Tupakula, Uday
Techniques for securing software defined networks and services
Security as a service model for cloud environment
- Varadharajan, Vijay, Tupakula, Udaya
TrustLite: a security architecture for tiny embedded devices
- Koeberl, Patrick, Schulz, Steffen, Sadeghi, Ahmad-Reza, Varadharajan, Vijay
Trust enhanced security architecture for detecting insider threats
- Tupakula, Udaya, Varadharajan, Vijay
Dynamic state-based security architecture for detecting security attacks in virtual machines
- Tupakula, Udaya Kiran, Varadharajan, Vijay
A community based authentication and authorisation mechanism for digital ecosystem
- Pranata, Ilung, Skinner, Geoff, Athauda, Rukshan
On the design of virtual machine intrusion detection system
- Tupakula, Udaya, Varadharajan, Vijay
Are you sure you would like to clear your session, including search history and login status?