Browsing byAuthorBernardo, DV

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 8 to 25 of 25< previous 
Issue DateTitleAuthor(s)
2011-01-01Integrating Scholarly Articles within E-Learning CoursesChua, BB; Bernardo, DV; Kwan, R; McNaught, C; Tsang, P; Wang, FL; Li, KC
2010-01-01Introducing Scholarly Articles: A way for Attaining Educational SustainabilityChua, BB; Bernardo, DV; Gadomski, AM; Kramer, AM; Lester, CY; Popescu, M
2015-01-01Introduction and analysis of SDN and NFV security architecture (SN-SECA)Bernardo, DV; Chua, BB
2012-07-01Multi-layer security analysis and experimentation of high speed protocol data transfer for GRIDBernardo, DV; Hoang, DB
2009-11-12Network security considerations for a new generation protocol UDTBernardo, DV; Hoang, D
2012Network security mechanisms and implementations for the next generation reliable fast data transfer protocol - UDTBernardo, DV
2013-01-01Open Source Developer Download Tiers: A Survival FrameworkChua, BB; Bernardo, DV
2010-12-01A pragmatic approach: Achieving acceptable security mechanisms for high speed data transfer protocol-UDTBernardo, DV; Hoang, DB
2010-12-01Protecting next generation high speed network protocol - UDT through generic security service application program interface - GSS-APIBernardo, DV; Hoang, D
2009-12-01Quantitative Security Risk Assessment (SRA) method: An empirical case studyBernardo, DV; Chua, BB; Hoang, D
2013-01-01Random Validation and Fault Detection Method in Systems ImplementationsBernardo, DV; Chua, BB
-Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characterizationBernardo, DV; Hoang, DB
2012-01Securing the Cloud, Dispelling Fears: Ways to Combat Climate ChangeBernardo, DV; NA
2010-07-20Security analysis of the proposed practical security mechanisms for high speed data transfer protocolBernardo, DV; Hoang, D
2009-01A Security Framework and its Implementation in Fast Data Transfer Next Generation Protocol UDTBernardo, DV; Hoang, DB
2012-01Security risk assessment: toward a comprehensive practical risk managementBernardo, DV
2012-05-14Symbolic analysis of the proposed UDT security architectureBernardo, DV; Hoang, DB
2010-01Understanding the use of Elicitation Approaches for Effective Requirements GatheringChua, B; Bernardo, DV; Verner, J; Hall, J; Kaindl, H; Lavazza, L; Buchgeher, G; Takaki, O