Computer security

Results: 47159



#Item
31Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks Sunghwan Kim, Seunghyun Yoon, and Hyuk Lim School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technol

Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks Sunghwan Kim, Seunghyun Yoon, and Hyuk Lim School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technol

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 15:46:40
32Poster: IoTcube: An Automated Analysis Platform for Finding Security Vulnerabilities Seulbae Kim, Seunghoon Woo, Heejo Lee, Hakjoo Oh Department of Computer Science and Engineering Korea University Seoul, Korea

Poster: IoTcube: An Automated Analysis Platform for Finding Security Vulnerabilities Seulbae Kim, Seunghoon Woo, Heejo Lee, Hakjoo Oh Department of Computer Science and Engineering Korea University Seoul, Korea

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-21 15:07:31
33Massive Distributed and Parallel Log Analysis For Organizational Security Xiaokui Shu, John Smiy, Danfeng (Daphne) Yao, and Heshan Lin Department of Computer Science Virginia Tech Blacksburg, VirginiaEmails: {subx

Massive Distributed and Parallel Log Analysis For Organizational Security Xiaokui Shu, John Smiy, Danfeng (Daphne) Yao, and Heshan Lin Department of Computer Science Virginia Tech Blacksburg, VirginiaEmails: {subx

Add to Reading List

Source URL: people.cs.vt.edu

Language: English - Date: 2013-11-20 11:50:22
    34Virginia Tech Department of Computer Science Postdoctoral researcher Seek one or two postdoctoral researchers who are interested in the use of system engineering and data analytics to ensure system and software security.

    Virginia Tech Department of Computer Science Postdoctoral researcher Seek one or two postdoctoral researchers who are interested in the use of system engineering and data analytics to ensure system and software security.

    Add to Reading List

    Source URL: people.cs.vt.edu

    Language: English - Date: 2017-06-29 15:14:44
      35Robustly Secure Computer Systems: A New Security Paradigm of System Discontinuity ∗ Jon A. Solworth

      Robustly Secure Computer Systems: A New Security Paradigm of System Discontinuity ∗ Jon A. Solworth

      Add to Reading List

      Source URL: www.ethos-os.org

      Language: English - Date: 2017-04-30 19:19:48
        36Scalable Anonymous Communication with Provable Security Prateek Mittal, Nikita Borisov∗ Dept. of Electrical and Computer Engineering, U. of Illinois at Urbana-Champaign,  Carmela Troncoso, Alfredo Rial†

        Scalable Anonymous Communication with Provable Security Prateek Mittal, Nikita Borisov∗ Dept. of Electrical and Computer Engineering, U. of Illinois at Urbana-Champaign, Carmela Troncoso, Alfredo Rial†

        Add to Reading List

        Source URL: carmelatroncoso.com

        Language: English - Date: 2015-11-19 22:20:42
          37Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ron Rivest Handout 6 April 22, 2014

          Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ron Rivest Handout 6 April 22, 2014

          Add to Reading List

          Source URL: courses.csail.mit.edu

          Language: English
            38CS461/ECE422 Computer Security I September 18, 2015 Project 2: Web Security Pitfalls

            CS461/ECE422 Computer Security I September 18, 2015 Project 2: Web Security Pitfalls

            Add to Reading List

            Source URL: courses.engr.illinois.edu

            Language: English - Date: 2015-12-04 12:59:10
              39Empowering Mobile Software Agents Volker Roth? Fraunhofer Institute for Computer Graphics Dept. Security Technology Fraunhoferstr. 5, 64283 Darmstadt, Germany

              Empowering Mobile Software Agents Volker Roth? Fraunhofer Institute for Computer Graphics Dept. Security Technology Fraunhoferstr. 5, 64283 Darmstadt, Germany

              Add to Reading List

              Source URL: www.volkerroth.com

              Language: English - Date: 2007-11-23 00:00:49
                40Teaching Computer Security  Teaching Computer Security Matt Bishop Department of Computer Science University of California at Davis

                Teaching Computer Security Teaching Computer Security Matt Bishop Department of Computer Science University of California at Davis

                Add to Reading List

                Source URL: seclab.cs.ucdavis.edu

                Language: English - Date: 2006-01-16 10:12:36