Security Analysis Of 5G Mobile Networks
By Tao Wan, CableLabs; Mansour Ganji, Rogers Communications
|
2019 |
Mugged on the Information Superhighway: Security Problems and Solutions
By Robert Adams, Intel Corporation
|
1994 |
Cable Stereo -- Performance And Security Issues
By Ned L. Mountain, Wegener Communications, Inc.
|
1983 |
Security And Savings: Going Digital And Getting Both
By Alec Main, Cloakware Corporation
|
2004 |
Dynamically Addressing the Gap of Software Application Protection without Hardware Security
By Rafie Shamsaasef & Aaron Anderson, CommScope
|
2019 |
Analysis Of Bandwidth-Conservative Service Opportunity
By Gregory E. Feldkamp, Ph.D, @Security Broadband Corporation
|
2002 |
DOCSIS 4.0 Security: A Comprehensive Guide to Successful Deployments
By Massimiliano Pala, Doug Jones, Yuan Tian, Craig Pratt; CableLabs
|
2022 |
Security Of Equipment And Services - The Terminal Manufacturers Role
By Graham S. Stubbs,
OAK Industries Inc.
|
1977 |
Internet of Things Security: Implement a Strong, Simple & Massively Scalable Solution
By Ron Ih, Kyrio
|
2018 |
Detecting and Mitigating Distributed Denial of Service Attack with Transparent Security
By Randy Levensalor, CableLabs; Chris Sibley, Cox Communications
|
2021 |
Security and Privacy IoT Vulnerabilities: The Danger of Too Many Entry Points
By Mangesh Bhamre, Plume Design, Inc.
|
2022 |
Changing the World: IoT Chaos as a Ladder to Improving Security
By Brian A. Scriber, CableLabs
|
2019 |
When Security and Privacy Collide: New Approaches are Needed
By Sandy Wilbourn & Craig Sprosts, Akamai
|
2018 |
Privacy Posture 2022 - The Intersection of Technology, Policy, Standards, and Security
By Brian Scriber, CableLabs
|
2022 |
Motivational Metrics for Security: Driving Progress Without Burning Bridges
By Matt Carothers, Cox Communications; Brad Boucher, Cox Communications
|
2023 |
E-Commerce Over Cable: Providing Security For Interactive Applications
By Tony Wasilewski, Scientific-Atlanta, Inc.
|
1999 |
RDK + CA/DRM: Enhancing Interoperability For Robust Revenue Security
By Petr Peterka, Verimatrix
|
2015 |
Internet Service Providers and Cybersecurity: Device Identification and Security at the Edge
By Scott Dotto, Charter Communications; Justinas Bisikirskas, CUJO AI; Kyle Johnson, Charter Communications; Leonardas Marozas, CUJO AI; Tyson Vinson, Charter Communications
|
2023 |
Timely And Secure: Real-Time Performance Challenges Of Content Security
By Reza Rassool, Widevine® Technologies Inc.
|
2008 |
Security Issues For Remote Access And Virtual Private Networks Involving Cable Modems
By Daniel Howard, Digital Furnace Corporation
|
1999 |