Computer security

Results: 47159



#Item
131

Worst-Case Execution Time Analysis of Security Policies for Deeply Embedded Real-Time Systems Sibin Mohan Dept. of Computer Science, North Carolina State University, Raleigh, NCAbstract

Add to Reading List

Source URL: www.cs.virginia.edu

- Date: 2008-02-18 18:05:28
    132

    Side-channel Vulnerability Factor: A Metric for Measuring Information Leakage John Demme Robert Martin Adam Waksman Simha Sethumadhavan Computer Architecture Security and Technology Lab Department of Computer Science, Co

    Add to Reading List

    Source URL: www.cs.columbia.edu

    - Date: 2012-06-11 10:18:08
      133

      Security Incident Response Procedure Overview In the event of a computer security incident, the Computer Security Incident Response Team (CSIRT) will respond. If possible, two or more CSIRT members should be participatin

      Add to Reading List

      Source URL: itsecurity.gmu.edu

      - Date: 2013-01-07 04:07:23
        134

        YI 1080p Home Camera 2 Arrival of Computer Vision Technology from Seeing to Thinking YI 1080p Home Camera offers the world first HDR 1080P consumer security camera which brings the best picture quality for strong and bad

        Add to Reading List

        Source URL: d3pk9z7j5el572.cloudfront.net

        - Date: 2016-11-28 04:12:12
          135

          2013 IEEE Symposium on Security and Privacy SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements Jeremy Clark and Paul C. van Oorschot School of Computer Science

          Add to Reading List

          Source URL: www.ieee-security.org

          - Date: 2013-04-05 19:52:29
            136

            2016 IEEE Symposium on Security and Privacy Cache Storage Channels: Alias-Driven Attacks and Verified Countermeasures Roberto Guanciale, Hamed Nemati, Christoph Baumann and Mads Dam Department of Computer Science

            Add to Reading List

            Source URL: www.ieee-security.org

            - Date: 2016-04-21 14:48:04
              137

              Grailog 1.0: Graph-Logic Visualization of Ontologies and Rules Harold Boley National Research Council, Security and Disruptive Technologies University of New Brunswick, Faculty of Computer Science Fredericton, NB, Canada

              Add to Reading List

              Source URL: www.cs.unb.ca

              - Date: 2013-05-12 19:46:42
                138

                Big Picture: Tying it All Together W. Owen Redwood, Ph.D. Offensive Computer Security 2.0 www.hackallthethings.com

                Add to Reading List

                Source URL: hackallthethings.com

                - Date: 2016-10-27 19:29:11
                  139

                  Computer Science Specialisations: internet networks, systems and computer networks, network and information technology security Degree obtained: Bachelor, Duration: 7 semesters (3,5 years) Selected subjects for

                  Add to Reading List

                  Source URL: www.pwsz.nysa.pl

                  - Date: 2012-10-25 03:13:09
                    140

                    ACCEPTED TO APPEAR IN IEEE TRANSACTIONS ON COMPUTER AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS 1 The STREAM Mechanism to Improve CPS Security The Case of the Smart Grid

                    Add to Reading List

                    Source URL: ganges.usc.edu

                    - Date: 2016-05-03 14:55:46
                      UPDATE