Skip to search formSkip to main contentSkip to account menu

Open security

Open security is the use of open source philosophies and methodologies to approach computer security and other information security challenges… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
This paper describes an attack-directed approach to test SIP authentication vulnerabilities in session establishment and user… 
2014
2014
Wireless sensor network is widespread used in hospital environment with mobile device such as NFC, RFID tag and small sensor… 
2013
2013
This thesis studies and develops concepts and algorithms for understanding and improving the behavior of middleboxes, their… 
2012
2012
Article history: Received Apr 24 th , 2012 Revised May 17 th , 2012 Accepted June 01 th , 2012 The evolution of cloud computing… 
2011
2011
Synchronous e-training is emerging as an alternative for developing human resources training plans in large organizations. Real… 
2010
2010
Both cloud and GRID are computing paradigms for the large-scale management of distributed resources. Even if the first is usually… 
2008
2008
In order to realise complex service-based applications on system platforms for context-aware ubiquitous computing environments… 
Review
2007
Review
2007
2003
2003
MOSES [1] an EC funded project, is intended to build upon the results of previous IST projects acting in the multimedia content…