IEEE Software

Results: 1638



#Item
271IEEE Computer Society / Los Angeles / Soongsil University / Software architecture / Geography of California / Geography of the United States / Software engineers / Computer science / IEEE Transactions on Software Engineering / Software engineering

Jae young Bang Computer Science Department, Viterbi School of Engineering, University of Southern California, Los Angeles, CA 90089

Add to Reading List

Source URL: ronia.net

Language: English - Date: 2015-04-20 12:00:26
272Software bugs / C Standard Library / Stack buffer overflow / Buffer overflow / Subroutines / Address space layout randomization / Return-to-libc attack / NX bit / Pointer / Computing / Software engineering / Computer programming

2013 IEEE Symposium on Security and Privacy Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

Add to Reading List

Source URL: wwwx.cs.unc.edu

Language: English - Date: 2014-09-05 15:38:44
273Virtual memory / University of Cambridge Computer Laboratory / Xen / Hyper-V / Rootkit / Hypervisor / Virtualization / Hardware virtualization / Device file / System software / Software / Virtual machines

1 Trail of Bytes: New Techniques for Supporting Data Provenance and Limiting Privacy Breaches Srinivas Krishnan, Member, IEEE, Kevin Z. Snow, and Fabian Monrose

Add to Reading List

Source URL: wwwx.cs.unc.edu

Language: English - Date: 2014-09-05 15:38:44
274Application programming interfaces / Communications protocol / Data transmission / Protocols / Monad / Distributed computing / Operating system / X Window System / Transmission Control Protocol / Computing / Software / Data

Poster: Contract Verification for Mobile Security Hannah Gommerstadt Frank Pfenning Limin Jia

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:44
275Computer network security / IEEE 802 / Computer networking / Packet Processing / Deep packet inspection / Quality of service / Cloud computing / WiMAX / System Architecture Evolution / System software / Computing / Electronic engineering

White Paper Virtualisation in Telecoms Networks Intel® Architecture Processors Networking and Communications Realising the Benefits of Network

Add to Reading List

Source URL: www.intel.de

Language: English - Date: 2014-03-04 14:05:00
276Wireless networking / Network access / Telecommunications engineering / Hotspot / Wireless / IEEE 802.11 / Devicescape Software / Generic Access Network / Wi-Fi / Technology / Electronic engineering

Traditional Hotspots and Homespots SPARE CAPACITY ONLY Mobile clients are instantly throttled as the spare capacity varies to make sure there is no negative impact for the home user

Add to Reading List

Source URL: static.anyfinetworks.com

Language: English - Date: 2015-06-22 11:17:44
277Building automation / Home automation / IEEE 802 / Wireless networking / ZigBee / NesC / Component-based software engineering / Adhesive / ZK / Computing / Software engineering / Software architecture

Microsoft Word - MDA-PL-SSC-SPLC2010-Final

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-11-01 02:00:44
278Computer network security / IEEE 802 / Computer networking / Packet Processing / Deep packet inspection / Quality of service / Cloud computing / WiMAX / System Architecture Evolution / System software / Computing / Electronic engineering

White Paper Virtualisation in Telecoms Networks Intel® Architecture Processors Networking and Communications Realising the Benefits of Network

Add to Reading List

Source URL: www.intel.nl

Language: English - Date: 2014-03-02 05:22:49
279HTTP / Secure communication / Cryptographic protocols / Electronic commerce / Portable software / HTTP Secure / HTTP Strict Transport Security / Transport Layer Security / Man-in-the-middle attack / Software / Computing / Cryptography

Poster: Man-in-the-Browser-Cache: Persisting HTTPS Attacks via Browser Cache Poisoning Yaoqi Jia∗ , Yue Chen‡ , Xinshu Dong† , Prateek Saxena∗ , Jian Mao‡ , Zhenkai Liang∗ ∗ Department of Computer Science,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:31
280Internet / Tor / Onion routing / Network topology / Routing / ANts P2P / Telecommunications network / Communications protocol / Internet privacy / Computing / Software

Poster: Blindspot: Indistinguishable Anonymous Communications Joseph Gardiner, Shishir Nagaraja Security Lancaster Research Centre Lancaster University United Kingdom, LA1 4WA

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:33
UPDATE