Browsing by Author Bernardo, DV

Showing results 1 to 20 of 25  next >
Issue DateTitleAuthor(s)
1-Jan-2015Introduction and analysis of SDN and NFV security architecture (SN-SECA)Bernardo, DV; Chua, BB
1-Jan-2013Random Validation and Fault Detection Method in Systems ImplementationsBernardo, DV; Chua, BB
1-Jan-2013Open Source Developer Download Tiers: A Survival FrameworkChua, BB; Bernardo, DV
1-Jul-2012Multi-layer security analysis and experimentation of high speed protocol data transfer for GRIDBernardo, DV; Hoang, DB
14-May-2012Symbolic analysis of the proposed UDT security architectureBernardo, DV; Hoang, DB
14-May-2012Compositional logic for proof of correctness of proposed UDT security mechanismsBernardo, DV; Hoang, DB
Jan-2012Security risk assessment: toward a comprehensive practical risk managementBernardo, DV
Jan-2012Securing the Cloud, Dispelling Fears: Ways to Combat Climate ChangeBernardo, DV; NA
2012Network security mechanisms and implementations for the next generation reliable fast data transfer protocol - UDTBernardo, DV
1-Dec-2011Formalization and information-theoretic soundness in the development of security architecture for next generation network protocol - UDTBernardo, DV; Hoang, DB
31-May-2011Empirical survey: Experimentation and implementations of high speed protocol data transfer for GRIDBernardo, DV; Hoang, DB
1-Jan-2011Integrating Scholarly Articles within E-Learning CoursesChua, BB; Bernardo, DV; Kwan, R; McNaught, C; Tsang, P; Wang, FL; Li, KC
1-Dec-2010Protecting next generation high speed network protocol - UDT through generic security service application program interface - GSS-APIBernardo, DV; Hoang, D
1-Dec-2010End-to-end security methods for UDT data transmissionsBernardo, DV; Hoang, DB
1-Dec-2010A pragmatic approach: Achieving acceptable security mechanisms for high speed data transfer protocol-UDTBernardo, DV; Hoang, DB
20-Jul-2010Security analysis of the proposed practical security mechanisms for high speed data transfer protocolBernardo, DV; Hoang, D
18-May-2010A conceptual approach against next generation security threats: Securing a high speed network protocol - UDTBernardo, DV; Hoang, DB
1-Jan-2010Introducing Scholarly Articles: A way for Attaining Educational SustainabilityChua, BB; Bernardo, DV; Gadomski, AM; Kramer, AM; Lester, CY; Popescu, M
Jan-2010Understanding the use of Elicitation Approaches for Effective Requirements GatheringChua, B; Bernardo, DV; Verner, J; Hall, J; Kaindl, H; Lavazza, L; Buchgeher, G; Takaki, O
1-Dec-2009Quantitative Security Risk Assessment (SRA) method: An empirical case studyBernardo, DV; Chua, BB; Hoang, D