Computer security

Results: 47159



#Item
61A Characterization of IPv6 Network Security Policy Mark Allman International Computer Science Institute MAPRG Meeting	 April 2016

A Characterization of IPv6 Network Security Policy Mark Allman International Computer Science Institute MAPRG Meeting April 2016

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2016-04-04 11:55:18
    622010 IEEE Symposium on Security and Privacy  Outside the Closed World: On Using Machine Learning For Network Intrusion Detection Robin Sommer International Computer Science Institute, and

    2010 IEEE Symposium on Security and Privacy Outside the Closed World: On Using Machine Learning For Network Intrusion Detection Robin Sommer International Computer Science Institute, and

    Add to Reading List

    Source URL: oaklandsok.github.io

    Language: English - Date: 2018-03-14 15:33:55
      63Journal of Computer Security–623 IOS Press 591  Improved typings for probabilistic noninterference

      Journal of Computer Security–623 IOS Press 591 Improved typings for probabilistic noninterference

      Add to Reading List

      Source URL: users.cis.fiu.edu

      Language: English - Date: 2007-01-31 09:52:22
        64CIRCL - Computer Incident Response Center Luxembourg  TRAINING AND TECHNICAL COURSES CATALOGUE 2016 from Incident Response to Operational Security

        CIRCL - Computer Incident Response Center Luxembourg TRAINING AND TECHNICAL COURSES CATALOGUE 2016 from Incident Response to Operational Security

        Add to Reading List

        Source URL: www.circl.lu

        Language: English - Date: 2016-08-11 10:49:35
          65BRIDGING THE GAP BETWEEN COMPUTER SECURITY AND LEGAL REQUIREMENTS CHRISTOPHER E. EVERETT* Table of Contents Abstract .......................................................................................................

          BRIDGING THE GAP BETWEEN COMPUTER SECURITY AND LEGAL REQUIREMENTS CHRISTOPHER E. EVERETT* Table of Contents Abstract .......................................................................................................

          Add to Reading List

          Source URL: infosecon.net

          Language: English - Date: 2006-03-16 20:15:32
            662016 IEEE 29th Computer Security Foundations Symposium  Axioms for Information Leakage M´ario S. Alvim∗ Carroll Morgan§ ∗

            2016 IEEE 29th Computer Security Foundations Symposium Axioms for Information Leakage M´ario S. Alvim∗ Carroll Morgan§ ∗

            Add to Reading List

            Source URL: users.cis.fiu.edu

            Language: English - Date: 2017-08-28 11:59:30
              67Computer Security and Privacy for Refugees in the United States Lucy Simko∗ , Ada Lerner† , Samia Ibtasam∗ , Franziska Roesner∗ and Tadayoshi Kohno∗ ∗ Paul  G. Allen School of Computer Science & Engineering

              Computer Security and Privacy for Refugees in the United States Lucy Simko∗ , Ada Lerner† , Samia Ibtasam∗ , Franziska Roesner∗ and Tadayoshi Kohno∗ ∗ Paul G. Allen School of Computer Science & Engineering

              Add to Reading List

              Source URL: www.franziroesner.com

              Language: English - Date: 2018-03-15 15:28:34
                68CSComputer Security and Privacy Module 1 Introduction to Computer Security and Privacy Winter 2011

                CSComputer Security and Privacy Module 1 Introduction to Computer Security and Privacy Winter 2011

                Add to Reading List

                Source URL: crysp.uwaterloo.ca

                Language: English - Date: 2018-08-13 15:14:12
                  69Proceedings  Foundations of Computer Security Affiliated with LICS’05  Chicago, IL

                  Proceedings Foundations of Computer Security Affiliated with LICS’05 Chicago, IL

                  Add to Reading List

                  Source URL: www.cse.chalmers.se

                  Language: English - Date: 2005-07-04 05:01:44
                    70Int. J. Advanced Networking and Applications Volume: 07 Issue: 01 Pages: ISSN: Security Solutions against Computer Networks

                    Int. J. Advanced Networking and Applications Volume: 07 Issue: 01 Pages: ISSN: Security Solutions against Computer Networks

                    Add to Reading List

                    Source URL: www.ijana.in

                    Language: English - Date: 2015-08-13 01:20:09