يعرض 1 - 10 نتائج من 17 نتيجة بحث عن '"Koscher, Karl"', وقت الاستعلام: 1.02s تنقيح النتائج
  1. 1
    كتاب إلكتروني

    المؤلفون: Ney, PeterAff2, Bhattacharya, ArkaprabhaAff2, Ceze, LuisAff2, Koscher, KarlAff2, Kohno, TadayoshiAff2, Nivala, JeffAff2, Aff3

    المساهمون: Greenbaum, Dov, editorAff1

    المصدر: Cyberbiosecurity : A New Field to Deal with Emerging Threats. :95-114

  2. 2
    مؤتمر

    المصدر: 2010 IEEE Symposium on Security and Privacy Security and Privacy (SP), 2010 IEEE Symposium on. :447-462 May, 2010

    Relation: 2010 IEEE Symposium on Security and Privacy (SP)

  3. 3
    مؤتمر

    المصدر: 2010 5th ACM/IEEE International Conference on Human-Robot Interaction (HRI) Human-Robot Interaction (HRI), 2010 5th ACM/IEEE International Conference on. :251-258 Mar, 2010

    Relation: 2010 5th ACM/IEEE International Conference on Human-Robot Interaction (HRI)

  4. 4
    مؤتمر

    المصدر: 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07) Distributed Computing Systems Workshops, 2007. ICDCSW '07. 27th International Conference on. :49-49 Jun, 2007

    Relation: 2007 27th International Conference on Distributed Computing Systems Workshops

  5. 5
    دورية أكاديمية
  6. 6

    المساهمون: Computer Systems

    المصدر: 12th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2019, co-located with USENIX Security 2019
    Crow, S, Farinholt, B, Johannesmeyer, B, Koscher, K, Checkoway, S, Savage, S, Schulman, A, Snoeren, A C & Levchenko, K 2019, ' Triton : A software-reconfigurable federated avionics testbed ', Paper presented at 12th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2019, co-located with USENIX Security 2019, Santa Clara, United States, 12/08/19 . < https://www.usenix.org/conference/cset19/presentation/crow >

  7. 7
    مؤتمر

    المصدر: Proceedings of the 16th ACM Conference: Computer & Communications Security; 11/ 9/2009, p33-42, 10p

  8. 8
    مؤتمر

    المصدر: Proceedings of the 11th International Conference: Ubiquitous Computing; 9/30/2009, p105-114, 10p

  9. 9
    مؤتمر

    المصدر: Proceedings of the 7th International Conference: Mobile Systems, Applications & Services; 6/22/2009, p69-82, 14p

  10. 10
    مؤتمر

    المصدر: Proceedings of the 15th ACM Conference: Computer & Communications Security; 10/27/2008, p479-490, 12p