Computer security software

Results: 11097



#Item
1Poster: (SF)2 I - Structure Field Software Fault Isolation Spyridoula Gravani, Zhuojia Shen, John Criswell Department of Computer Science, University of Rochester Email: {sgravani, zshen10, criswell}@cs.rochester.edu  Ab

Poster: (SF)2 I - Structure Field Software Fault Isolation Spyridoula Gravani, Zhuojia Shen, John Criswell Department of Computer Science, University of Rochester Email: {sgravani, zshen10, criswell}@cs.rochester.edu Ab

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 06:12:20
2Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks Sunghwan Kim, Seunghyun Yoon, and Hyuk Lim School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technol

Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks Sunghwan Kim, Seunghyun Yoon, and Hyuk Lim School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technol

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 15:46:40
3Virginia Tech Department of Computer Science Postdoctoral researcher Seek one or two postdoctoral researchers who are interested in the use of system engineering and data analytics to ensure system and software security.

Virginia Tech Department of Computer Science Postdoctoral researcher Seek one or two postdoctoral researchers who are interested in the use of system engineering and data analytics to ensure system and software security.

Add to Reading List

Source URL: people.cs.vt.edu

Language: English - Date: 2017-06-29 15:14:44
    4Empowering Mobile Software Agents Volker Roth? Fraunhofer Institute for Computer Graphics Dept. Security Technology Fraunhoferstr. 5, 64283 Darmstadt, Germany

    Empowering Mobile Software Agents Volker Roth? Fraunhofer Institute for Computer Graphics Dept. Security Technology Fraunhoferstr. 5, 64283 Darmstadt, Germany

    Add to Reading List

    Source URL: www.volkerroth.com

    Language: English - Date: 2007-11-23 00:00:49
      5IMPROVING SOFTWARE SECURITY WITH PRECISE STATIC AND RUNTIME ANALYSIS A DISSERTATION SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE

      IMPROVING SOFTWARE SECURITY WITH PRECISE STATIC AND RUNTIME ANALYSIS A DISSERTATION SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE

      Add to Reading List

      Source URL: www.doc.ic.ac.uk

      Language: English - Date: 2017-01-10 09:15:12
        6A Security Domain Model for Static Analysis and Verification of Software Programs Alan B. Shaffer Naval Postgraduate School Computer Science Dept Monterey, CA, USA

        A Security Domain Model for Static Analysis and Verification of Software Programs Alan B. Shaffer Naval Postgraduate School Computer Science Dept Monterey, CA, USA

        Add to Reading List

        Source URL: faculty.nps.edu

        Language: English - Date: 2008-05-06 17:12:31
          7REGISTRATION DOCUMENT  SUPPLY AND DELIVERY OF COMPUTERS, COMPUTER HARDWARE EQUIPMENT SYSTEM SECURITY SOFTWARE AND COMPUTER ACCESSORIES

          REGISTRATION DOCUMENT SUPPLY AND DELIVERY OF COMPUTERS, COMPUTER HARDWARE EQUIPMENT SYSTEM SECURITY SOFTWARE AND COMPUTER ACCESSORIES

          Add to Reading List

          Source URL: www.youthfund.go.ke

          Language: English - Date: 2017-05-24 13:41:29
            8Creating and Managing Computer Security Incident Handling Teams (CSIRTs) CERT Training and Education Networked Systems Survivability Software Engineering Institute

            Creating and Managing Computer Security Incident Handling Teams (CSIRTs) CERT Training and Education Networked Systems Survivability Software Engineering Institute

            Add to Reading List

            Source URL: www.first.org

            - Date: 2017-08-08 15:42:43
              9ITL BULLETIN FOR JULY 2016 IMPROVING SECURITY AND SOFTWARE MANAGEMENT THROUGH THE USE OF SWID TAGS David Waltermire, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory

              ITL BULLETIN FOR JULY 2016 IMPROVING SECURITY AND SOFTWARE MANAGEMENT THROUGH THE USE OF SWID TAGS David Waltermire, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory

              Add to Reading List

              Source URL: csrc.nist.gov

              - Date: 2016-08-23 14:55:14
                10C A S E S T U DY  Food for the Hungry stops malware in its tracks This nonprofit uses Malwarebytes Anti-Malware for Business to detect and stop malware from gobbling valuable time from its mission

                C A S E S T U DY Food for the Hungry stops malware in its tracks This nonprofit uses Malwarebytes Anti-Malware for Business to detect and stop malware from gobbling valuable time from its mission

                Add to Reading List

                Source URL: pt.malwarebytes.com

                Language: English - Date: 2016-07-07 18:41:23