Diversity Via Code Transformations: A Solution For NGNA Renewable Security
By Yongxin Zhou, Alec Main, Cloakware Inc.
|
2006 |
Security And Savings: Going Digital And Getting Both
By Alec Main, Cloakware Corporation
|
2004 |
Dynamically Addressing the Gap of Software Application Protection without Hardware Security
By Rafie Shamsaasef & Aaron Anderson, CommScope
|
2019 |
Internet of Things Security: Implement a Strong, Simple & Massively Scalable Solution
By Ron Ih, Kyrio
|
2018 |
Cloud-based Dynamic Executable Verification
By Rafie Shamsaasef, Aaron Anderson & Sasha Medvinsky, CommScope
|
2020 |
Pay Per View, Security, And Energy Controls Via Cable: The Rippling River Project
By Clifford B. Schrock,
C.B. Schrock and Associates, Inc.
|
1979 |
Bitcode Obfuscation - Protecting Software Without Source Code Access
By Rafie Shamsaasef, Lex Aaron Anderson; CommScope
|
2022 |
Quality-of-Experience Monitoring, Optimization and Management: A Unified End-to-End Solution
By Zhou Wang, PhD, FIEEE, University of Waterloo; Abdul Rehman, PhD, SSIMWAVE Inc.
|
2018 |
Security and Privacy IoT Vulnerabilities: The Danger of Too Many Entry Points
By Mangesh Bhamre, Plume Design, Inc.
|
2022 |
5G Security & Protection Framework
By Vasu Dalal & Patrick Nta, NOKIA
|
2021 |
Approaches To Security And Access Control For Digital Cable Television
By Claude T. Baggett, Cable Television Laboratories, Inc.
|
1997 |
Securing Digital Content – Strengths And Weaknesses Of Software And Hardware Implementations
By Robin Wilson
|
2005 |
Zero Trust Security Architecture for The Enterprise
By Sarah Weinstein, Christopher Zarcone, Stephen Zevan; Comcast
|
2022 |
Establishing a Strong Security Posture for Open RAN
By Scott Poretsky, Ericsson
|
2022 |
DOCSIS 4.0 Security: A Comprehensive Guide to Successful Deployments
By Massimiliano Pala, Doug Jones, Yuan Tian, Craig Pratt; CableLabs
|
2022 |
Space Diversity Reception For CATV
By K.J. Easton
|
1967 |
CATV Via Satellite
By Frederick W. Ford,
G. Norman Penwell,
Louis B. Early,
Robert D. Briskman,
Irving A. Kahn,
Frank W. Norwood,
Nathaniel E. Feldman,
|
1969 |
Addressable Security
By Al Clark,
Cybertech, Inc.
|
1980 |
Downloadable Security
By James William Fahrny
|
2005 |
A Unified GitOps Continuous Deployment Approach for Telco Hybrid Workloads
By Stephan Salas, Ruibing Hao, Ph.D; Comcast, Inc.
|
2022 |