Computer insecurity

Results: 197



#Item
1Measuring the Insecurity of Mobile Deep Links of Android Fang Liu, Chun Wang, Andres Pico, Danfeng Yao, Gang Wang Department of Computer Science, Virginia Tech {fbeyond, wchun, andres, danfeng, gangwang}@vt.edu  Abstract

Measuring the Insecurity of Mobile Deep Links of Android Fang Liu, Chun Wang, Andres Pico, Danfeng Yao, Gang Wang Department of Computer Science, Virginia Tech {fbeyond, wchun, andres, danfeng, gangwang}@vt.edu Abstract

Add to Reading List

Source URL: people.cs.vt.edu

Language: English - Date: 2017-06-28 15:41:58
2Measuring the Insecurity of Mobile Deep Links of Android Fang Liu, Chun Wang, Andres Pico, Danfeng Yao, Gang Wang Department of Computer Science, Virginia Tech {fbeyond, wchun, andres, danfeng, gangwang}@vt.edu  Abstract

Measuring the Insecurity of Mobile Deep Links of Android Fang Liu, Chun Wang, Andres Pico, Danfeng Yao, Gang Wang Department of Computer Science, Virginia Tech {fbeyond, wchun, andres, danfeng, gangwang}@vt.edu Abstract

Add to Reading List

Source URL: people.cs.vt.edu

Language: English - Date: 2017-07-03 07:58:05
    3Security Watch  Rebecca T. Mercuri Standards Insecurity Standards can provide an important component in the computer

    Security Watch Rebecca T. Mercuri Standards Insecurity Standards can provide an important component in the computer

    Add to Reading List

    Source URL: www.notablesoftware.com

    Language: English - Date: 2007-02-28 16:29:49
    4Student Food Insecurity: Predictors and Consequences

    Student Food Insecurity: Predictors and Consequences

    Add to Reading List

    Source URL: service.uark.edu

    Language: English - Date: 2016-07-12 15:23:03
    5Keys Under Doormats: mandating insecurity by requiring government access to all data and communications Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew

    Keys Under Doormats: mandating insecurity by requiring government access to all data and communications Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew

    Add to Reading List

    Source URL: www.schneier.com

    Language: English - Date: 2015-12-10 18:36:20
    6The Halting Problems of Network Stack Insecurity Le n S a s s a m a n , M e r e d i t h L . P a t t e r s o n , Se r g e y B r a t u s , and Anna Shubina  Len Sassaman was a PhD

    The Halting Problems of Network Stack Insecurity Le n S a s s a m a n , M e r e d i t h L . P a t t e r s o n , Se r g e y B r a t u s , and Anna Shubina Len Sassaman was a PhD

    Add to Reading List

    Source URL: langsec.org

    Language: English - Date: 2011-12-01 04:10:13
    7The Halting Problems of Network Stack Insecurity Le n S a s s a m a n , M e r e d i t h L . P a t t e r s o n , Se r g e y B r a t u s , and Anna Shubina  Len Sassaman was a PhD

    The Halting Problems of Network Stack Insecurity Le n S a s s a m a n , M e r e d i t h L . P a t t e r s o n , Se r g e y B r a t u s , and Anna Shubina Len Sassaman was a PhD

    Add to Reading List

    Source URL: static.usenix.org

    Language: English - Date: 2011-11-23 16:29:49
    8Atacuri avansate impotriva institutiilor financiare Metode de prevenire si raspuns Teodor Cimpoesu, Cyber Security BU Director Cyber Risks, Bucuresti, 9 Oct, 2014

    Atacuri avansate impotriva institutiilor financiare Metode de prevenire si raspuns Teodor Cimpoesu, Cyber Security BU Director Cyber Risks, Bucuresti, 9 Oct, 2014

    Add to Reading List

    Source URL: cyberisks.ro

    Language: English - Date: 2014-10-10 03:40:58
    9T h e r e i s i n c r e a s i n g ta l k o f c y b e r Dav i d D i t t r i ch  the conflicts facing those responding to cyberconflict Dave Dittrich holds an appointment as an

    T h e r e i s i n c r e a s i n g ta l k o f c y b e r Dav i d D i t t r i ch the conflicts facing those responding to cyberconflict Dave Dittrich holds an appointment as an

    Add to Reading List

    Source URL: static.usenix.org

    Language: English - Date: 2009-12-01 11:51:21
    10Attribution in Cyberspace: Challenges for U.S. Law Enforcement

    Attribution in Cyberspace: Challenges for U.S. Law Enforcement

    Add to Reading List

    Source URL: fas.org

    Language: English - Date: 2015-04-24 12:07:52