Cyber Security About us Our people Publications Research projects Cyber Security Publications Read more about our research. Transparent authentication methodology in electronic education Nawfal Fadhel, David Argles, Richard M Crowder & Gary B. Wills, 2014, Engineering Management Reviews, 3, P23 - 32 Type: journalSpecialIssue Physical-level synthesis for digital lab-on-a-chip considering variation, contamination and defect 2014, IEEE Transactions on Nanobioscience, 13(1), 3-11 DOI: 10.1109/TNB.2013.2294943 Type: article Cloud-based data stream processing Thomas Heinze, Leonardo Aniello, Leonardo Querzoni & Zbigniew Jerzak, 2014 DOI: 10.1145/2611286.2611309 Type: conference The overlay scan attack: inferring topologies of distributed pub/sub systems through broker saturation Leonardo Aniello, Roberto Baldoni, Claudio Ciccotelli, Giuseppe Antonio Di Luna, Francesco Frontali & Leonardo Querzoni, 2014 Type: conference Towards a non-intrusive recognition of anomalous system behavior in data centers 2014 DOI: 10.1007/978-3-319-10557-4_38 Type: conference Pagination Previous page ‹ Previous … Page 16 Page 17 Page 18 Page 19 Current page 20 Page 21 Page 22 Page 23 Page 24 Next page Next ›