USA

Results: 56396



#Item
11Malware / Security / Kernel / Hypervisor / Pin / Cybercrime / Prevention

SAMPLE SUBMISSION Title Battle of the SKM and IUM: How Windows 10 Rewrites OS Architecture Alex Ionescu, Chief Architect, CrowdStrike (Black Hat USA 2015)

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2018-05-11 13:28:08
12Virtual reality in fiction / Gaming / Collectible card games / Leisure / Android: Netrunner / Netrunner / Human behavior / Swiss-system tournament / Android / Double-elimination tournament / Mus / Wizard

WizardsLicense4c_2_25_USA.eps

Add to Reading List

Source URL: images-cdn.fantasyflightgames.com

Language: English - Date: 2017-04-28 11:56:56
13Information science / Knowledge representation / Knowledge engineering / Artificial intelligence / Knowledge / Computational linguistics / Natural language processing / Crowdsourcing / Ontology / Semantic Web / Annotation / General Architecture for Text Engineering

Leveraging Crowdsourcing for the Thematic Annotation of the Qur’an Amna Basharat, I. Budak Arpinar, Khaled Rasheed Dept. of Computer Science, University of Georgia, Athens, GA, 30605 USA amnabash,budak,

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 00:24:27
14Software / Computing / Web browsers / JavaScript / Google Chrome / Firefox / Content Security Policy / Browser extension / Document Object Model / Browser security / Chromium / Adobe Flash

Session A4: Browsers CCS’17, October 30-November 3, 2017, Dallas, TX, USA Most Websites Don’t Need to Vibrate: A Cost–Benefit Approach to Improving Browser Security

Add to Reading List

Source URL: acmccs.github.io

Language: English - Date: 2017-12-30 21:51:58
15Computing / Free software / Dark web / Internet / Cryptographic protocols / Internet Standards / Computer network security / Tor / .onion / Botnet / Internet privacy / Bipartite graph

HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 23:38:22
16Parallel computing / Computing / Computer engineering / Computer science / Electrical engineering / Electronic engineering / Electromagnetism / Message Passing Interface / Model checking / Computer programming / Computational science / Simulation

The Toolkit for Accurate Scientific Software Stephen F. Siegel, Timothy Zirkel, Yi Wei Verified Software Laboratory Department of Computer and Information Sciences University of Delaware Newark, DE, USA

Add to Reading List

Source URL: www.lix.polytechnique.fr

Language: English - Date: 2010-07-21 10:31:15
17Computer programming / Computing / Mathematics / Theoretical computer science / Boolean algebra / Error detection and correction / Compiler construction / Hash function / Avalanche effect / Optimizing compiler / Recursion / MD5

Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping Dongpeng Xu The Pennsylvania State University University Park, USA Email:

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:56:44
18Computing / Software engineering / Computer programming / Formal languages / Scheme / Regular expression / Eval / String / Parameter / Supervised learning

Predicting a Correct Program in Programming by Example Rishabh Singh(B) and Sumit Gulwani Microsoft Research, Redmond, USA

Add to Reading List

Source URL: rishabhmit.bitbucket.io

Language: English - Date: 2018-06-25 09:59:57
19Cryptography / Multivariate cryptography / Post-quantum cryptography / Hidden Field Equations / Unbalanced Oil and Vinegar / QUAD / Quadratic form / Digital signature / Quadratic function / XSL attack

HMFEv - An Efficient Multivariate Signature Scheme Albrecht Petzoldt1(B) , Ming-Shing Chen2 , Jintai Ding3 , and Bo-Yin Yang2 1 National Institute for Standards and Technology, Gaithersburg, MD, USA

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2018-03-14 01:35:29
20Theoretical computer science / Logic / Mathematical logic / Logic in computer science / Artificial intelligence / Automated reasoning / Automated theorem proving / Predicate logic / Quantifier / Andrei Voronkov / Z3 / Alt-Ergo

AVATAR Modulo Theories Nikolaj Bjøner1 Giles Reger2 Martin Suda3 Andrei Voronkov2,4,5 1 Microsoft Research, Redmond, USA University of Manchester, Manchester, UK

Add to Reading List

Source URL: www.cs.man.ac.uk

Language: English - Date: 2016-10-06 05:17:59
UPDATE