Engineering

Results: 482474



#Item
41Cryptography / Obfuscation / Computer security / Password / Security / Cyberwarfare / Salt / Identity management / Password policy / Password fatigue

Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 08:13:56
42Security / Security breaches / Prevention / Ransomware / Cybercrime / Malware / Locky / Computer security

Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-24 15:44:20
43Mathematics / Dynamic programming / Markov decision process / Stochastic control / Probability / Mathematical analysis / Reachability

Symbolic Magnifying Lens Abstraction in Markov Decision Processes Pritam Roy1 David Parker2 Gethin Norman2 Luca de Alfaro1 Computer Engineering Dept, UC Santa Cruz, Santa Cruz, CA, USA 1 Oxford University Computing Labor

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2008-07-01 03:47:28
44Computing / Software engineering / Computer programming / Debugging / Cross-platform software / Object-oriented programming languages / Procedural programming languages / Assertion / Logic in computer science / Configuration management / PHP / Program slicing

Which Configuration Option Should I Change? Sai Zhang Michael D. Ernst Department of Computer Science & Engineering

Add to Reading List

Source URL: zhang-sai.github.io

Language: English - Date: 2015-05-05 00:58:34
45Carnegie Mellon University / Host family

STUDENT PARTICIPANT RELEASE FORM I want to participate in the Carnegie Mellon University Africa “CMU-Africa” Host Family Program. I understand that I will be matched with a host or host family from the Kigali area t

Add to Reading List

Source URL: www.africa.engineering.cmu.edu

Language: English - Date: 2018-09-12 05:46:12
46Fiction / Software / Computer programming / Build automation / Compiling tools / Jason Voorhees / Computer / Friday the 13th / SCons / Git

Learning gem5 – Part I Getting started with gem5 Jason Lowe-Power http://learning.gem5.org/ https://faculty.engineering.ucdavis.edu/lowepower/

Add to Reading List

Source URL: learning.gem5.org

Language: English - Date: 2018-09-17 11:50:24
47Computing / Mathematics / Mathematical software / Routing / Internet architecture / Emerging technologies / Network architecture / Load balancing / Open Shortest Path First / Computer network / Solver / Network topology

REPETITA: Repeatable Experiments for Performance Evaluation of Traffic-Engineering Algorithms Steven Gay ∗, Pierre Schaus ∗, Stefano Vissicchio † ∗ Universite catholique de Louvain, † University College London

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2017-10-24 20:49:21
48Software engineering / Theoretical computer science / Formal methods / Computing / Computer science / Computer security / Model checking / Verification / Formal verification / Carnegie Mellon University / Proof-carrying code / Software Engineering Institute

Trust in Formal Methods Toolchains Arie Gurfinkel Software Engineering Institute Carnegie Mellon University

Add to Reading List

Source URL: arieg.bitbucket.io

Language: English - Date: 2018-10-19 18:15:18
49Concurrent computing / Computer network security / Multi-agent systems / Spamming / Computing / Cybercrime / Distributed computing / Malware / Botnet / Peer-to-peer / Social peer-to-peer processes

Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of Sciences

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 09:17:38
50Cryptocurrencies / Blockchains / Ethereum / Alternative currencies / Concurrent computing / Computing / Distributed computing / Cross-platform software / Smart contract / Solidity / ERC-20 / CryptoKitties

Erays: Reverse Engineering Ethereum’s Opaque Smart Contracts Yi Zhou Deepak Kumar Surya Bakshi Joshua Mason Andrew Miller Michael Bailey University of Illinois, Urbana-Champaign Abstract Interacting with Ethereum smart

Add to Reading List

Source URL: kumarde.com

Language: English - Date: 2018-08-16 10:08:06
UPDATE