engineering

Results: 482474



#Item
41Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 08:13:56
42Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-24 15:44:20
43Symbolic Magnifying Lens Abstraction in Markov Decision Processes Pritam Roy1 David Parker2 Gethin Norman2 Luca de Alfaro1 Computer Engineering Dept, UC Santa Cruz, Santa Cruz, CA, USA 1 Oxford University Computing Labor

Symbolic Magnifying Lens Abstraction in Markov Decision Processes Pritam Roy1 David Parker2 Gethin Norman2 Luca de Alfaro1 Computer Engineering Dept, UC Santa Cruz, Santa Cruz, CA, USA 1 Oxford University Computing Labor

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2008-07-01 03:47:28
44Which Configuration Option Should I Change? Sai Zhang Michael D. Ernst  Department of Computer Science & Engineering

Which Configuration Option Should I Change? Sai Zhang Michael D. Ernst Department of Computer Science & Engineering

Add to Reading List

Source URL: zhang-sai.github.io

Language: English - Date: 2015-05-05 00:58:34
45STUDENT PARTICIPANT RELEASE FORM  I want to participate in the Carnegie Mellon University Africa “CMU-Africa” Host Family Program. I understand that I will be matched with a host or host family from the Kigali area t

STUDENT PARTICIPANT RELEASE FORM I want to participate in the Carnegie Mellon University Africa “CMU-Africa” Host Family Program. I understand that I will be matched with a host or host family from the Kigali area t

Add to Reading List

Source URL: www.africa.engineering.cmu.edu

Language: English - Date: 2018-09-12 05:46:12
46Learning gem5 – Part I Getting started with gem5 Jason Lowe-Power http://learning.gem5.org/ https://faculty.engineering.ucdavis.edu/lowepower/

Learning gem5 – Part I Getting started with gem5 Jason Lowe-Power http://learning.gem5.org/ https://faculty.engineering.ucdavis.edu/lowepower/

Add to Reading List

Source URL: learning.gem5.org

Language: English - Date: 2018-09-17 11:50:24
47REPETITA: Repeatable Experiments for Performance Evaluation of Traffic-Engineering Algorithms Steven Gay ∗, Pierre Schaus ∗, Stefano Vissicchio † ∗  Universite catholique de Louvain, † University College London

REPETITA: Repeatable Experiments for Performance Evaluation of Traffic-Engineering Algorithms Steven Gay ∗, Pierre Schaus ∗, Stefano Vissicchio † ∗ Universite catholique de Louvain, † University College London

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2017-10-24 20:49:21
48Trust in Formal Methods Toolchains Arie Gurfinkel Software Engineering Institute Carnegie Mellon University

Trust in Formal Methods Toolchains Arie Gurfinkel Software Engineering Institute Carnegie Mellon University

Add to Reading List

Source URL: arieg.bitbucket.io

Language: English - Date: 2018-10-19 18:15:18
49Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2  Institute of Information Engineering, Chinese Academy of Sciences

Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of Sciences

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 09:17:38
50Erays: Reverse Engineering Ethereum’s Opaque Smart Contracts Yi Zhou Deepak Kumar Surya Bakshi Joshua Mason Andrew Miller Michael Bailey University of Illinois, Urbana-Champaign Abstract Interacting with Ethereum smart

Erays: Reverse Engineering Ethereum’s Opaque Smart Contracts Yi Zhou Deepak Kumar Surya Bakshi Joshua Mason Andrew Miller Michael Bailey University of Illinois, Urbana-Champaign Abstract Interacting with Ethereum smart

Add to Reading List

Source URL: kumarde.com

Language: English - Date: 2018-08-16 10:08:06