and Engineering

Results: 219165



#Item
61

Leveraging Internet Background Radiation for Opportunistic Network Analysis Karyn Benson∗† , Alberto Dainotti† , kc claffy† , Alex C. Snoeren∗ , Michael Kallitsis‡ ∗ Computer Science and Engineering, UC Sa

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2018-09-13 19:48:51
    62Cryptography / Mathematics / Post-quantum cryptography / Lattice-based cryptography / Lie groups / Computational hardness assumptions / Lattice problem / Lattice / Euclidean algorithm / LenstraLenstraLovsz lattice basis reduction algorithm / Ideal lattice cryptography / Short integer solution problem

    Gauss Sieve Algorithm on GPUs Shang-Yi Yang1 , Po-Chun Kuo1(B) , Bo-Yin Yang2 , and Chen-Mou Cheng1 1 Department of Electrical Engineering, National Taiwan University, Taipei, Taiwan {ilway25,kbj,doug}@crypto.tw

    Add to Reading List

    Source URL: precision.moscito.org

    Language: English - Date: 2018-05-28 18:07:35
    63System software / Computing / Utility software / Computer network security / Computer security / Configuration management / Network architecture / Software-defined networking / Intrusion detection system / Snort / OpenFlow / Traffic flow

    Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks Sunghwan Kim, Seunghyun Yoon, and Hyuk Lim School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technol

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-14 15:46:40
    64Software testing / Computer security / Security engineering / Cyberwarfare / Cybercrime / Computer network security / Fuzzing / Software bugs / Application security / Vulnerability / Internet of things / Heartbleed

    Poster: IoTcube: An Automated Analysis Platform for Finding Security Vulnerabilities Seulbae Kim, Seunghoon Woo, Heejo Lee, Hakjoo Oh Department of Computer Science and Engineering Korea University Seoul, Korea

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-21 15:07:31
    65Computing / Information theory / Information and communications technology / Telecommunications engineering / Data transmission / Network performance / Computer networking / Internet architecture / Multipath routing / Transmission Control Protocol / Packet loss / Routing

    Deadline-Aware Multipath Communication: An Optimization Problem Laurent Chuat∗ , Adrian Perrig∗ , Yih-Chun Hu† of Computer Science, ETH Zurich, Switzerland † Department of Electrical and Computer Engineering, Uni

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English
    66Statistical classification / Coding theory / Computer arithmetic / Error detection and correction / Machine learning / Computing / Naive Bayes classifier / Learning / Advanced Encryption Standard / Block cipher / Bit array / Hamming

    Practical Template-Algebraic Side Channel Attacks with Extremely Low Data Complexity Yossef Oren, Ofir Weisse and Avishai Wool Cryptography and Network Security Lab School of Electrical Engineering Tel-Aviv University, R

    Add to Reading List

    Source URL: www.ofirweisse.com

    Language: English - Date: 2018-10-17 09:19:20
    67Compilers / LLVM / Carnegie Mellon University / Unidentified flying object / Mellon / Carnegie / Arie / Software

    UFO: Verification with Interpolants and Abstract Interpretation Arie Gurfinkel and Sagar Chaki Software Engineering Institute Carnegie Mellon University

    Add to Reading List

    Source URL: arieg.bitbucket.io

    Language: English - Date: 2018-10-19 18:15:18
    68Transport / Land transport / Automation / Emerging technologies / Road transport / Modeling and simulation / Advanced driver assistance systems / Simulation / Advanced driver-assistance systems / Self-driving car / Traffic / Automated driving system

    Assuring the Safety of Advanced Driver Assistance Systems through a Combination of Simulation and Runtime Monitoring Malte Mauritz, Falk Howar, and Andreas Rausch Institute for Applied Software Systems Engineering (IPSSE

    Add to Reading List

    Source URL: www.falkhowar.de

    Language: English - Date: 2018-09-30 08:43:02
    69Information flow / Information theory / CPU cache / Flow / Timing attack / Mathematical model / Mathematics / Computing / Knowledge

    A Practical Testing Framework for Isolating Hardware Timing Channels Jason Oberg∗ , Sarah Meiklejohn∗ , Timothy Sherwood† and Ryan Kastner∗ ∗ Computer Science and Engineering, University of California, San Die

    Add to Reading List

    Source URL: smeiklej.com

    Language: English - Date: 2018-10-23 14:58:02
    70

    PDF Document

    Add to Reading List

    Source URL: www.drinking-water-engineering-and-science.net

    - Date: 2016-02-01 18:29:41
      UPDATE