Approach

Results: 36997



#Item
31Security / Security breaches / Prevention / Ransomware / Cybercrime / Malware / Locky / Computer security

Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-24 15:44:20
32Computational science / Applied mathematics / Modeling and simulation / Scientific modeling / Simulation / Computer simulation / Control theory / Self-driving car / Systems science

Utilizing S-TaLiRo as an Automatic Test Generation Framework for Autonomous Vehicles Cumhur Erkan Tuncali, Theodore P. Pavlic and Georgios Fainekos Abstract— This paper proposes an approach to automatically generating

Add to Reading List

Source URL: www.public.asu.edu

Language: English - Date: 2018-02-08 19:28:54
33Graph theory / Networks / Hypergraph / Community structure / Recommender system / Graph / Bipartite graph / Line graph / Multipartite graph / Directed graph / Draft:FolkRank / Graph partition

A Graph-Coarsening Approach for Tag Recommendation Manel Hmimida Rushed Kanawati LIPN-CNRS UMR 7030

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 00:40:31
34Cloud computing / Computing / IT infrastructure / Cloud infrastructure / As a service / Platform as a service / Microsoft Azure / Specification / Deliverable

Small or medium-scale focused research project (STREP) ICT SME-DCA Call 2013 FP7-ICT-2013-SME-DCA Data Publishing through the Cloud: A Data- and Platform-as-a-Service Approach to Efficient

Add to Reading List

Source URL: bd7a65e2cb448908f934-86a50c88e47af9e1fb58ce0672b5a500.r32.cf3.rackcdn.com

Language: English - Date: 2014-09-10 09:12:06
35Theoretical computer science / Mathematics / Mathematical logic / Boolean algebra / Formal methods / Logic in computer science / Electronic design automation / NP-complete problems / Boolean satisfiability problem / Satisfiability modulo theories / Unit propagation / Literal

DPLL(T) with Exhaustive Theory Propagation and its Application to Difference Logic Robert Nieuwenhuis and Albert Oliveras? Abstract. At CAV’04 we presented the DPLL(T ) approach for satisfiability modulo theories T . I

Add to Reading List

Source URL: www.lsi.upc.edu

Language: English - Date: 2005-06-14 03:44:48
36Process calculi / Theoretical computer science / Process calculus / Mathematics / -calculus / Calculus / Lambda calculus / Computer science / Actor model and process calculi history / Join-calculus

A Generic Process Calculus Approach to Relaxed-Memory Consistency Palle Raabjerg Tjark Weber

Add to Reading List

Source URL: user.it.uu.se

Language: English - Date: 2015-05-22 10:50:40
37Computing / Information Age / Internet security / Cyberwarfare / Computer security / Security engineering / HackerOne / Bug bounty program / E-commerce / Hacker / Security hacker / Signal-to-noise ratio

THE HACKERONE COMMUNITY DIFFERENCE The HackerOne Community Difference Get to know the HackerOne community of hackers and see details of the HackerOne platform and approach.

Add to Reading List

Source URL: www.hackerone.com

Language: English - Date: 2018-10-04 15:56:47
38Computing / Computer security / Internet security / Information Age / Information and communications technology / HackerOne / Computer viruses / Bug bounty program / Hacker culture / Security hacker / Hacker / Katie Moussouris

ZOMATO’S HACKER-FOCUSED APPROACH TURNS THE TABLES ON SECURITY VULNERABILITIES Connecting eaters with restaurants is Zomato’s main business, so they took a hospitable approach to hackers, driving engagement and qualit

Add to Reading List

Source URL: www.hackerone.com

Language: English - Date: 2018-08-21 12:07:31
39Mathematical logic / Logic / Mathematics / Predicate logic / Formal methods / Semantics / Edsger W. Dijkstra / Predicate transformer semantics / First-order logic / FO / Quantifier / Equality

A Semantic Approach to Secure Information Flow K. Rustan M. Leino1 and Rajeev Joshi2 1 DEC SRC, Palo Alto, CA 94301, USA

Add to Reading List

Source URL: rjoshi.org

Language: English - Date: 2010-09-11 18:26:03
UPDATE