Inaugural KU EECS KEDS Award Presented Inaugural KU EECS KEDS Award Presented SHARE: Share by Email Share on LinkedIn Share on Facebook Share on X, formerly known as Twitter
Two EECS Graduate Students Claim Top Honors at International Radar Conference Two EECS Graduate Students Claim Top Honors at International Radar Conference SHARE: Share by Email Share on LinkedIn Share on Facebook Share on X, formerly known as Twitter
A Novel Application of Distributed Ledger Technology to Enable Secure and Reliable Data Transport in Delay-Sensitive Applications A Novel Application of Distributed Ledger Technology to Enable Secure and Reliable Data Transport in Delay-Sensitive Applications Read more about A Novel Application of Distributed Ledger Technology to Enable Secure and Reliable Data Transport in Delay-Sensitive Applications
Formally Verified Bundling and Appraisal of Layered Attestation Protocols Formally Verified Bundling and Appraisal of Layered Attestation Protocols Read more about Formally Verified Bundling and Appraisal of Layered Attestation Protocols
Users Defined Policy Enforcement with Cross-App Interaction Discovery in IoT Platforms Users Defined Policy Enforcement with Cross-App Interaction Discovery in IoT Platforms Read more about Users Defined Policy Enforcement with Cross-App Interaction Discovery in IoT Platforms
Radar Spectrum Sharing via Non-repeating Frequency Notched FM Waveforms Radar Spectrum Sharing via Non-repeating Frequency Notched FM Waveforms Read more about Radar Spectrum Sharing via Non-repeating Frequency Notched FM Waveforms
Spectral Cohabitation and Interference Mitigation via Physical Radar Emissions Spectral Cohabitation and Interference Mitigation via Physical Radar Emissions Read more about Spectral Cohabitation and Interference Mitigation via Physical Radar Emissions
Packet Loss Prevention in Queues using SDN Packet Loss Prevention in Queues using SDN Read more about Packet Loss Prevention in Queues using SDN
IoTPrivComp: Privacy Compliance in IoT Apps IoTPrivComp: Privacy Compliance in IoT Apps Read more about IoTPrivComp: Privacy Compliance in IoT Apps
Explore Effectiveness and Performance of Security Checks on Software Binaries Explore Effectiveness and Performance of Security Checks on Software Binaries Read more about Explore Effectiveness and Performance of Security Checks on Software Binaries