Computer security

Results: 47159



#Item
51Journal of Computer Security–657 DOIJCSIOS Press 601

Journal of Computer Security–657 DOIJCSIOS Press 601

Add to Reading List

Source URL: wwwhomes.doc.ic.ac.uk

Language: English - Date: 2014-05-01 06:38:12
52Causality-based Sensemaking of Network Traffic for Android Application Security∗ Hao Zhang, Danfeng (Daphne) Yao, and Naren Ramakrishnan Department of Computer Science, Virginia Tech Blacksburg, VA, USA {haozhang, danf

Causality-based Sensemaking of Network Traffic for Android Application Security∗ Hao Zhang, Danfeng (Daphne) Yao, and Naren Ramakrishnan Department of Computer Science, Virginia Tech Blacksburg, VA, USA {haozhang, danf

Add to Reading List

Source URL: people.cs.vt.edu

Language: English - Date: 2016-09-27 09:25:21
    53Learning from Early Attempts to Measure Information Security Performance Jing Zhang1 , Robin Berthier2 , Will Rhee3 , Michael Bailey1 , Partha Pal4 , Farnam Jahanian1 , and William H. Sanders2 1 Dept.  of Computer Scienc

    Learning from Early Attempts to Measure Information Security Performance Jing Zhang1 , Robin Berthier2 , Will Rhee3 , Michael Bailey1 , Partha Pal4 , Farnam Jahanian1 , and William H. Sanders2 1 Dept. of Computer Scienc

    Add to Reading List

    Source URL: nsrg.ece.illinois.edu

    Language: English - Date: 2018-06-11 12:51:20
      54INSERT YOUR ORGANIZATION NAME  PROTECT YOUR STUFF: GET COMPUTER UPDATES. SECURITY UPDATES DO MORE THAN JUST PROTECT YOUR COMPUTER AGAINST THE LATEST WORMS, VIRUSES, HACKS, AND OTHER INTERNET VILLAINS. THEY PROTECT YOUR P

      INSERT YOUR ORGANIZATION NAME PROTECT YOUR STUFF: GET COMPUTER UPDATES. SECURITY UPDATES DO MORE THAN JUST PROTECT YOUR COMPUTER AGAINST THE LATEST WORMS, VIRUSES, HACKS, AND OTHER INTERNET VILLAINS. THEY PROTECT YOUR P

      Add to Reading List

      Source URL: infosec.ohio.gov

      - Date: 2015-10-01 13:47:36
        55Developing Security Protocols by Refinement Christoph Sprenger David Basin  Dept. of Computer Science

        Developing Security Protocols by Refinement Christoph Sprenger David Basin Dept. of Computer Science

        Add to Reading List

        Source URL: people.inf.ethz.ch

        Language: English - Date: 2014-04-16 16:25:47
          56High System-Code Security with Low Overhead Jonas Wagner∗ , Volodymyr Kuznetsov∗ , George Candea∗ , and Johannes Kinder† ∗ School of Computer and Communication Sciences École Polytechnique Fédérale de Lausan

          High System-Code Security with Low Overhead Jonas Wagner∗ , Volodymyr Kuznetsov∗ , George Candea∗ , and Johannes Kinder† ∗ School of Computer and Communication Sciences École Polytechnique Fédérale de Lausan

          Add to Reading List

          Source URL: dslab.epfl.ch

          Language: English - Date: 2018-08-14 09:29:24
            57Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ronald L. Rivest Handout 3 February 23, 2015

            Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ronald L. Rivest Handout 3 February 23, 2015

            Add to Reading List

            Source URL: courses.csail.mit.edu

            Language: English
              58Published at the 2017 USENIX Security Symposium; addition information at https://dnasec.cs.washington.edu/.  Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and

              Published at the 2017 USENIX Security Symposium; addition information at https://dnasec.cs.washington.edu/. Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and

              Add to Reading List

              Source URL: dnasec.cs.washington.edu

              Language: English - Date: 2017-08-09 23:52:51
                59“Oops, I did it again” – Security of One-Time Signatures under Two-Message Attacks Leon Groot Bruinderink and Andreas Hülsing Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, P.O.

                “Oops, I did it again” – Security of One-Time Signatures under Two-Message Attacks Leon Groot Bruinderink and Andreas Hülsing Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, P.O.

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2017-09-25 03:25:51