IEEE Software

Results: 1638



#Item
321Hacking / Software testing / Threat / Abuse / Vulnerability / Attack tree / Insider / Motivation / Computer network security / Cyberwarfare / Computer security

2014 IEEE Security and Privacy Workshops Understanding Insider Threat: A Framework for Characterising Attacks Jason R.C. Nurse† , Oliver Buckley† , Philip A. Legg† , Michael Goldsmith† , Sadie Creese† , Gordon

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2014-04-30 03:10:27
322Windows games / Video game genres / Video games / Procedural generation / Institute of Electrical and Electronics Engineers / Genetic algorithm / Open world / Dungeon crawl / Dungeons / Digital media / Software / Application software

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOITCIAIG, IEEE

Add to Reading List

Source URL: graphics.tudelft.nl

Language: English - Date: 2013-12-09 09:01:55
323Cryptographic protocols / Needham–Schroeder protocol / Dropbox / Program refinement / Vulnerability / VisIt / Lottery / Computer security / Software / Computing / Computer network security

2014 IEEE Security and Privacy Workshops Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis Christian W. Probst Technical University of Denmark

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2014-04-30 03:10:08
324Text mode / Wget / Capability-based security / Capsicum / Process / Programming language / Computer program / Computer security / Algorithm / Software / Computing / Portable software

2013 IEEE Symposium on Security and Privacy Declarative, Temporal, and Practical Programming with Capabilities William R. Harris∗ , Somesh Jha∗ , Thomas Reps∗† , Jonathan Anderson‡ , and Robert N. M. Watson‡

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2013-04-05 19:52:14
325Programming language implementation / Cross-platform software / Procedural programming languages / C Standard Library / PaX / Address space layout randomization / Software bugs / JIT spraying / Compiler optimization / Computing / Software engineering / Software

SoK: Automated Software Diversity Per Larsen, Andrei Homescu, Stefan Brunthaler, Michael Franz University of California, Irvine Abstract—The idea of automatic software diversity is at least two decades old. The defici

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-04-21 13:48:10
326Password / IEEE 802.11

List of Compatible Projector Models - FromWireless Manager ME5.5 Software Wired LAN Wireless LAN

Add to Reading List

Source URL: panasonic.net

Language: English - Date: 2012-07-06 05:15:13
327Hypervisor / Cloud computing / Hyper-V / VM / Multitenancy / System software / Software / Virtual machines

Poster: Cloudtracker: Cloud-wide policy enforcement with real-time VM introspection Mirza Basim Baig∗ Conor Fitzsimons∗ Suryanarayanan Balasubramanian∗

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2013-05-17 10:01:47
328Unix / IEEE standards / System V / Mach / Tru64 UNIX / Single UNIX Specification / POSIX / Berkeley Software Distribution / Tput / Software / Computing / Computer architecture

Software Product Description PRODUCT NAME: System V Environment for Tru64UNIX Operating System Version 4.0F

Add to Reading List

Source URL: www.compaq.com

Language: English - Date: 2002-04-03 14:05:06
329Cross-platform software / Oracle Database / X Window System / Client–server model / Software / Computing / Relational database management systems

Dynamic Searchable Encryption via Blind Storage Muhammad Naveed, Manoj Prabhakaran, Carl A. Gunter University of Illinois at Urbana-Champaign Abstract—Dynamic Searchable Symmetric Encryption allows a client to store a

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-04-21 13:48:10
330Information theory / Radio resource management / Software-defined radio / IEEE 802 / Wireless networking / Eurescom / Orthogonal frequency-division multiplexing / Multi-user MIMO / MIMO / Technology / Electronic engineering / Telecommunications engineering

ISTMobileSummitLogoEvenDarker

Add to Reading List

Source URL: www.futurenetworksummit.eu

Language: English - Date: 2010-06-12 14:53:44
UPDATE