Computer network

Results: 31604



#Item
481Nevada System of Higher Education / Nevada / Desert Research Institute / Computer network / Privacy / Internet privacy / Content-control software / Nevada State College

NevadaNet Appropriate Use Policy (RevisedBackground The NevadaNet network is owned and operated by the Nevada System of Higher Education (NSHE). The purpose of NevadaNet is to develop and maintain wide

Add to Reading List

Source URL: www.scs.nevada.edu

Language: English - Date: 2014-12-05 15:51:17
482Economy / Profit / United States Generally Accepted Accounting Principles / Cybercrime / National security / E-commerce / Statement of changes in equity / Earnings before interest /  taxes /  depreciation /  and amortization / Computer security / Retained earnings / Income / Comprehensive income

25 March 2014 Corero Network Security plc (“Corero”, the “Company” or the “Group”) Full year results Corero Network Security plc (AIM: CNS), the AIM listed network security company and leading provider of Fir

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2014-03-25 04:57:53
483Artificial intelligence / Computer vision / Vision / Image processing / Surveillance / Image segmentation / Medical imaging / Image analysis / Artificial neural network / Background subtraction / Facial recognition system / Image registration

Contents ix xiii xv SESSION 1

Add to Reading List

Source URL: www.icgip.org

Language: English - Date: 2015-03-25 03:38:01
484Security / Prevention / Computing / Cybercrime / Cyberwarfare / National security / Mobile computers / Computer network security / Computer security / Bluetooth / Wi-Fi / Internet privacy

THE FACTS: MOBILE DEVICES Everyone’s on the go these days and taking smartphones, laptops, tablets and other devices along to get information, shop, manage documents, and of course communicate with friends and family.

Add to Reading List

Source URL: www.arcyber.army.mil

Language: English - Date: 2016-05-06 22:38:46
485Computer vision / Artificial intelligence / Computational neuroscience / Vision / Statistics / Artificial neural networks / Convolutional neural network / Robot control / Outline of object recognition / Pose / Image segmentation / Support vector machine

RGB-D Object Recognition and Pose Estimation Based on Pre-Trained Convolutional Neural Network Features

Add to Reading List

Source URL: www.ais.uni-bonn.de

Language: English - Date: 2015-03-03 05:00:04
486Computer network security / Computing / Computer security / Cyberwarfare / Security / Denial-of-service attacks / Internet Relay Chat / System administration / Denial-of-service attack / Dedicated hosting service / Managed security service / Splunk

SmartWall® THREAT DEFENSE SYSTEM SOLUTION BRIEF FIRST LINE OF DEFENSE

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2015-10-30 10:47:15
487Security / Cyberwarfare / Cybercrime / Computing / National security / Computer network security / Denial-of-service attacks / Computer security / Denial-of-service attack / Phishing / Draft:Corero Network Security

J14CNS AR13 1 COVER v3.pdf

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2014-03-28 05:44:45
488Computing / Internet / Network architecture / Content delivery network / Computer networking / Streaming / Internet television / Forwarding / Amazon CloudFront / Akamai Technologies / Cloudflare / X-Forwarded-For

Forwarding-Loop Attacks in Content Delivery Networks Jianjun Chen∗†‡ , Jian Jiang§ , Xiaofeng Zheng∗†‡ , Haixin Duan†‡¶ , Jinjin Liang∗†‡ , Kang Lik , Tao Wan∗∗ , Vern Paxson§¶ , ∗ Departm

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2015-12-20 14:16:29
489Cyberwarfare / Computer network security / Security / Computer security / Cybercrime / Social engineering / E-commerce / Phishing / Threat / Targeted threat / Threat Intelligence Platform / Advanced persistent threat

T2 SPEAR PHISHING PROTECTION T2 Analysis & Mitigation Disrupt spear phishing attacks before systems and data are compromised. Spear phishing is the most prevalent and successful tactic used in advanced targeted attacks.

Add to Reading List

Source URL: pages.phishlabs.com

Language: English - Date: 2016-08-11 09:01:38
490Computing / Distributed data storage / File sharing / Distributed computing / Gossip protocol / Network architecture / Peer-to-peer / Tree / Chord / Kademlia

BAR Gossip Harry C. Li, Allen Clement, Edmund L. Wong, Jeff Napper, Indrajit Roy, Lorenzo Alvisi, Michael Dahlin Dept. of Computer Sciences, The University of Texas at Austin

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2006-05-12 13:37:19
UPDATE