IEEE Software

Results: 1638



#Item
311Crime prevention / National security / Internet privacy / Intrusion detection system / Cyberwarfare / Computer virus / Computer security / Antivirus software / Privacy / Security / Computer network security / Ethics

Review of New Security Paradigms 2002 Workshop Papers By Christina Serban and Hilary Hosmer The New Security Paradigms Workshop (NSPW) offers researchers a safe, constructive environment to explore radical rather than ev

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2002-11-16 13:14:38
312Software bugs / Subroutines / C Standard Library / Return-to-libc attack / Control flow / Stack buffer overflow / Buffer overflow / Address space layout randomization / JMP / Computing / Software engineering / Computer programming

Out Of Control: Overcoming Control-Flow Integrity Enes Gökta¸s∗ Elias Athanasopoulos† Vrije Universiteit

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-04-21 13:48:10
313News aggregators / Internet Explorer / Internet privacy / Privacy mode / Internet Explorer 8 / Firefox / Google Chrome / Safari / Local shared object / Software / Web browsers / Portable software

2013 IEEE Security and Privacy Workshops Do Private and Portable Web Browsers Leave Incriminating Evidence? A Forensic Analysis of Residual Artifacts from Private and Portable Web Browsing Sessions Donny Jacob Ohana

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2013-05-05 16:05:02
314Telecommunications engineering / Network performance / Internet Protocol / Internet standards / Steganography / PDCP / E-UTRA / Goodput / Network packet / Software-defined radio / Universal Mobile Telecommunications System / Technology

2014 IEEE Security and Privacy Workshops Steganography in Long Term Evolution Systems Iwona Grabska, Krzysztof Szczypiorski Institute of Telecommunications

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2014-04-30 03:11:30
315HTTP / Computer crimes / Computer network security / Internet ethics / Cross-site request forgery / HTTP cookie / Phishing / Internet privacy / JavaScript / Software / Computing / Google Chrome

All Your Screens are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API Yuan Tian∗ , Ying-Chuan Liu‡ , Amar Bhosale† , Lin-Shung Huang∗ ,Patrick Tague† ,Collin Jackson∗ ∗ {yuan.tian, Carnegie Me

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2014-04-21 13:48:10
316Computer network security / Internet protocols / Phishing / Social engineering / Spamming / DNS spoofing / Intrusion detection system / Domain Name System / Database / Computing / Cybercrime / Internet

Poster: “Quilt: A system for distributed queries of security-relevant data” Dr. Timothy Shimeall and George M. Jones and Derrick H. Karimi CERT/Software Engineering Institute Carnegie-Mellon University Pittsburgh, Pe

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2013-05-17 10:01:51
317Max Planck Institute for Software Systems / Max Planck Institute for Computer Science / University of California /  Berkeley / Max Planck Society / Saarland University / National Institute for Research in Computer Science and Control / University of California / Microsoft Research / Privacy / Association of Public and Land-Grant Universities / Ethics / California

Monday, 18 May:30–8:45 Opening 8:45–10:15 Attacks and Defenses Tuesday, 19 May 2009

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2009-05-31 21:45:48
318Computer security / Access control / Identity management / Operating system / Kernel / Ring / Android / Malware / Google Chrome / Software / Computing / Cloud clients

User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2012-05-22 01:33:56
319OSI protocols / Radio resource management / IEEE 802 / MIMO / DBm / Telecommunications engineering / Software-defined radio / Multiplexing / Orthogonal frequency-division multiplexing

SPEC SHEET PMP 450 Access Point The Cambium Networks Point-to-Multipoint (PMP) 450 Access Point (AP) can provide more than 90 Mbps throughput and will be interoperable with PMP 430 and PMP 100 Series Subscriber Modules

Add to Reading List

Source URL: www.danimex.com

Language: English - Date: 2014-03-31 06:49:27
320Software testing / Security / Hacking / Vulnerability / Attack / Password / Security risk / Social engineering / RSA / Computer network security / Cyberwarfare / Computer security

TRESPASS: Plug-and-Play Attacker Profiles for Security Risk Analysis Wolter Pieters∗† , Dina Hadˇziosmanovi´c∗ , Aleksandr Lenin‡ , Lorena Montoya† , and Jan Willemson‡ ∗ Delft University of Technology,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-05-07 16:20:44
UPDATE