Bitcode Obfuscation - Protecting Software Without Source Code Access
By Rafie Shamsaasef, Lex Aaron Anderson; CommScope
|
2022 |
Dynamically Addressing the Gap of Software Application Protection without Hardware Security
By Rafie Shamsaasef & Aaron Anderson, CommScope
|
2019 |
Cloud-based Dynamic Executable Verification
By Rafie Shamsaasef, Aaron Anderson & Sasha Medvinsky, CommScope
|
2020 |
Key Learnings from Comcast’s Use of Open Source Software in the Access Network
By Louis Donofrio & Qin Zang, Comcast Cable; Vignesh Ramamurthy, Infosys Consulting
|
2020 |
A Supply Chain of Weak Links: Open Source Versus Proprietary Software Threat Analysis
By Brian A. Scriber, CableLabs
|
2023 |
Open Source, a Mindset and How it Has Transformed Common Platform Enumeration Stack Software Development using Reference Design Kit
By Khem Raj, Comcast
|
2022 |
Xml Schema Representing An EBIF Template Definition, Method For Auto-generating Schematic Instances From Original EBIF Source Code And Constraining Customized Instantiations Of The Resulting Template
By Mike McMahon and Lea Anne Dobbins, Comcast Media Center
|
2010 |
Diversity Via Code Transformations: A Solution For NGNA Renewable Security
By Yongxin Zhou, Alec Main, Cloakware Inc.
|
2006 |
2019 Virtualized CPE Services Have Finally Arrived Via Service Delivery Platforms
By Ian Wheelock & Charles Cheevers, CommScope
|
2019 |
Why Location is Now a Thing in Wi-Fi: Operational Considerations for Standard Power 6 GHz Wi-Fi
By Scott Voegele, CommScope
|
2023 |
Powering the Near Future 10G Access Network: Considerations for Assuring Sufficient and Reliable Power
By Rob Anderson, EnerSys Energy Systems
|
2020 |
Keeping The Lights On - Protecting Your Remote Active Fiber Elements Against Unplanned Outages
By Rob Anderson, EnerSys
|
2022 |
Ultra Low-Cost Injection-locked FP Laser Source for Coherent Access Networks
By Zhensheng (Steve) Jia, Ph.D., L. Alberto Campos, Ph.D., Mu Xu, Ph.D, Haipeng Zhang, Ph.D., Junwen Zhang, Ph.D., Chris Stengrim & Curtis Knittle, Ph.D., CableLabs
|
2019 |
Securing Digital Content – Strengths And Weaknesses Of Software And Hardware Implementations
By Robin Wilson
|
2005 |
Hidden Risk of Unpopularity in Open Source
By Chujiao Ma & Vaibhav Garg, Comcast Cable
|
2021 |
The Architecture of the Open-Source Remote Phy Device
By Alon Bernstein and Anlu Yan, Cisco Systems
|
2016 |
Openness And Secrecy In Security Systems: Polycipher Downloadable Conditional Access
By Tom Lookabaugh, PolyCipher and James Fahrny, Comcast Cable
|
2007 |
A Flexible and Scalable Architecture for Over-the-Air Credentials Provisioning
By Alexander Medvinsky, Dr. Tat Chan, Dr. Xin Qiu & Jason Pasion, CommScope
|
2020 |
Streaming Telemetry Data from the Home Network using OpenWrt Access CPE
By Shlomo Ovadia, Ph.D., Deependra Rawat & Dan Lynch, Charter Communications
|
2020 |
Delivering Access Beyond 10G: Coherent Subcarrier Aggregation as Backhaul for Next-Generation R-OLT, RMD, and Wireless
By Colin Howlett & Kevin A. Noll, Vecima; Aaron Chase & Antonio Napoli, Infinera; Jay Rolls, Pacband
|
2021 |