Chinese

Results: 36978



#Item
1

SCHWEIZ AUSSTELLUNG "CHINESE WHISPERS"

Add to Reading List

Source URL: www.bak.admin.ch

Language: German
    2

    SCHWEIZ AUSSTELLUNG "CHINESE WHISPERS"

    Add to Reading List

    Source URL: www.bak.admin.ch

    Language: Italian
      3Computing / Fingerprinting algorithms / Cryptography / Identification / Internet privacy / Biometrics / Computer network security / Device fingerprint / Internet fraud / Public key fingerprint / Fingerprint / Tor

      Poster: Identify and Track Web Attacker Based on Deceptive Technology and Browser Fingerprint Heyang Lv1 Binxing Fang2 Xiang Cui3,4 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-05-12 06:46:30
      4Economy / International trade / Economic development / Export / Freight transport / Productivity / Transition economy / Comparative advantage / Economic growth / Holger Grg / Maurice Kugler

      HONG KONG INSTITUTE FOR MONETARY RESEARCH PRODUCTIVITY, EXPORTING AND FINANCIAL CONSTRAINTS OF CHINESE SMES Johannes Van Biesebroeck

      Add to Reading List

      Source URL: www.hkimr.org

      Language: English - Date: 2018-01-25 21:30:46
      5

      SCHWEIZ AUSSTELLUNG "CHINESE WHISPERS"

      Add to Reading List

      Source URL: www.bak.admin.ch

      Language: Italian
        6Cryptography / Obfuscation / Computer security / Password / Security / Cyberwarfare / Salt / Identity management / Password policy / Password fatigue

        Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2017-05-13 08:13:56
        7Security / Security breaches / Prevention / Ransomware / Cybercrime / Malware / Locky / Computer security

        Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2017-05-24 15:44:20
        8Concurrent computing / Computer network security / Multi-agent systems / Spamming / Computing / Cybercrime / Distributed computing / Malware / Botnet / Peer-to-peer / Social peer-to-peer processes

        Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of Sciences

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2017-05-12 09:17:38
        9Bitcoin / Cryptocurrencies / Free software / Money / Economy / Alternative currencies / Digital currencies / Decentralization / SegWit / Blockchain / Mining pool / Satoshi Nakamoto

        The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin Ben Kaiser1 , Mireya Jurado2 , and Alex Ledger 1 2

        Add to Reading List

        Source URL: blockchain.princeton.edu

        Language: English - Date: 2018-09-26 16:49:38
        10Computer network security / Computing / Cyberwarfare / Multi-agent systems / Spamming / Cybercrime / Botnets / Intrusion detection system / Server / Cluster analysis / Internet bot / Computer security

        Poster: Detecting Command and Control Servers of Botnet With Randomized Traffic Di Wu1,2, Binxing Fang3, Fangjiao Zhang1,2 1 (Institute of Information Engineering, Chinese Academy of Sciences) 2 (School of Cyber Security

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2017-05-11 13:01:38
        UPDATE