Showing
1 - 6
results of
6
Skip to content
VuFind
Log in
Library Catalogue Plus
Library
Subject guides
Databases
Referencing
Catalogue
Articles Plus
Keyword
Title
Author
Subject
Find
Advanced Search
Search Results - Kwiat, Luke
Search Results - Kwiat, Luke
Showing
1 - 6
results of
6
Refine Results
Sort
Relevance
Date Descending
Author
Title
1
Loading…
Applying Chaos Theory for Runtime Hardware Trojan Monitoring and Detection
by
Zhao, Hong
,
Kwiat, Luke
,
Kwiat, Kevin A.
,
Kamhoua, Charles A.
,
Njilla, Laurent
Published in
IEEE transactions on dependable and secure computing
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
2
Loading…
Security-Aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach
by
Kwiat, Luke
,
Kamhoua, Charles A.
,
Kwiat, Kevin A.
,
Tang, Jian
,
Martin, Andrew
Request full text
Conference Proceeding
Save to List
Saved in:
3
Loading…
Game Theoretic Modeling of Security and Interdependency in a Public Cloud
by
Kamhoua, Charles A.
,
Kwiat, Luke
,
Kwiat, Kevin A.
,
Park, Joon S.
,
Ming Zhao
,
Rodriguez, Manuel
Request full text
Conference Proceeding
Save to List
Saved in:
4
Loading…
Security-aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach
by
Kwiat, Luke
,
Kamhoua, Charles A
,
Kwiat, Kevin A
,
Tang, Jian
,
Martin, Andrew
Request full text
Report
Save to List
Saved in:
5
Loading…
Security and Interdependency in a Public Cloud: A Game Theoretic Approach
by
Kamhoua, Charles A
,
Kwiat, Luke
,
Kwiat, Kevin A
,
Park, Joon S
,
Zhao, Ming
,
Rodriguez, Manuel
Request full text
Report
Save to List
Saved in:
6
Loading…
Game Theoretic Modeling of Security and Interdependency in a Public Cloud
by
Kamhoua, Charles A
,
Kwiat, Luke
,
Kwiat, Kevin A
,
Park, Joon S
,
Zhao, Ming
,
Rodriguez, Manuel
Request full text
Report
Save to List
Saved in:
Search Tools:
RSS Feed
Email Search
Save Search
Back
Refine Results
Page will reload when a filter is selected or excluded.
Limit To
Full Text
6 results
6
Format
Reports
3 results
3
Conference Proceedings
2 results
2
Articles
1 results
1
Journal Title
Ieee Transactions On Dependable And Secure Computing
1 results
1
Subjects
Cloud Computing
5 results
5
Game Theory
5 results
5
Externalities
4 results
4
Computer Network Security
3 results
3
Computer Science
3 results
3
Computer Science, Information Systems
3 results
3
Computer Systems Management And Standards
3 results
3
Cyber-Security
3 results
3
Interdependency
3 results
3
Learning Machines
3 results
3
Network Architecture
3 results
3
Operating Systems
3 results
3
Probability
3 results
3
Science & Technology
3 results
3
Security
3 results
3
Technology
3 results
3
Attack
2 results
2
Benefits
2 results
2
Communications Networks
2 results
2
Computer Programming And Software
2 results
2
Year of Publication
From:
To:
Source
Dtic Technical Reports
3 results
3
Ieee Electronic Library (Iel) Conference Proceedings
2 results
2
Ieee Xplore All Conference Series
2 results
2
Ieee Electronic Library (Iel) Journals
1 results
1
Ieee Xplore All Journals
1 results
1
Abi/Inform Global
1 results
1