Computer network

Results: 31604



#Item
281Security / Data management / Computing / Computer network security / Computer security / Cryptography / Cyberwarfare / National security / Data / Computer emergency response team / Search engine indexing

Data Mining in Incident Response Challenges and Opportunities Alexandre Dulaunoy TLP:WHITE Information Security Education

Add to Reading List

Source URL: www.circl.lu

Language: English - Date: 2016-08-11 10:49:35
282Computational neuroscience / Artificial neural networks / Image processing / Applied mathematics / Cybernetics / Computer vision / Convolutional neural network / Deep learning / Neuroscience / Artificial intelligence / Image segmentation

In Proceedings of 37th German Conference on Artificial Intelligence (KI), pp, Springer LNCS 8736, Stuttgart, SeptemberFast Semantic Segmentation of RGB-D Scenes with GPU-Accelerated Deep Neural Networks Nic

Add to Reading List

Source URL: www.ais.uni-bonn.de

Language: English - Date: 2014-08-04 06:23:43
283Computing / Data / Information / Data management / Database management systems / Machine learning / Record linkage / Database / Probabilistic database / Uncertain data / Social network / Information retrieval

Managing Uncertainty in Social Networks Eytan Adar and Christopher R´e Department of Computer Science and Engineering University of Washington {eadar,chrisre}@cs.washington.edu Abstract

Add to Reading List

Source URL: www.cond.org

Language: English - Date: 2007-07-02 17:30:57
284Computing / Security / Computer network security / Cybercrime / Data security / Computer security / Cryptography / Secure communication / Cloud computing / Multi-factor authentication / De-perimeterisation

Two Factor Authentication: Security in an Age of Zero Trust Jon Oberheide, CTO, Duo Security Not-so-surprising trends  Cloud

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-18 22:20:40
285Computer security / Cyberwarfare / Security / Computer network security / Hacking / Cybercrime / Advanced persistent threat / Espionage / Trend Micro / Zero-day / Targeted threat / Internet security

Detecting the Enemy Inside the Network: How tough is it to Deal with APTs?

Add to Reading List

Source URL: about-threats.trendmicro.com

Language: English - Date: 2013-04-19 02:52:06
286Computing / Computer networking / Wireless networking / Embedded systems / Transmission Control Protocol / Server / Wireless sensor network / Sensor node / X Window System core protocol / Yahoo! Messenger Protocol

Semester Thesis Traffic Monitoring in Sensor Networks Raphael Schmid Departments of Computer Science and Information Technology and Electrical Engineering, ETH Zurich Summer Term 2006

Add to Reading List

Source URL: disco.ethz.ch

Language: English - Date: 2014-09-26 08:36:59
287Computing / Security / Secure communication / Cyberwarfare / Computer security / Information privacy / Human rights / Data protection / Internet privacy / Privacy / Data mining / Internet security

Large-Scale Collection and Sanitization of Network Security Data: Risks and Challenges∗ (position paper) Phillip Porras Vitaly Shmatikov

Add to Reading List

Source URL: www.cyber-ta.org

Language: English - Date: 2006-07-31 13:42:23
288Technology / Network performance / Engineering / Information theory / Computing / Throughput / General Packet Radio Service / Computer performance / Computer network / USB / Latency / LTE

Obtaining In-Context Measurements of Cellular Network Performance Aaron Gember, Aditya Akella University of Wisconsin – Madison Jeffrey Pang, Alexander Varshavsky,

Add to Reading List

Source URL: www.kiskeya.net

Language: English - Date: 2012-08-31 15:25:24
289Computing / Ethernet / Network architecture / Computer architecture / Small form-factor pluggable transceiver / Gigabit Ethernet / IEEE 802.3 / Virtual LAN / Network switch / Spanning Tree Protocol / Link aggregation / IEEE 802.1Q

Part Number: KEY FEATURES AND BENEFITS:: • 9-Port fully managed industrial grade Gigabit switch

Add to Reading List

Source URL: www.econolite.com

Language: English - Date: 2016-05-13 17:33:40
290Computer architecture / Computing / Software / Computing platforms / Windows XP / Cloud clients / Smartphones / BIOS / Microsoft Windows / Enhanced Write Filter / Android / Windows XP editions

SJJ Embedded Micro Solutions Version 4.0 Coming Together: Best Practices for XPe in the Corporate Network

Add to Reading List

Source URL: www.seanliming.com

Language: English - Date: 2015-12-17 11:40:38
UPDATE