IEEE

Results: 22018



#Item
101Computing / System software / Software / Internet privacy / Computer network security / Device fingerprint / Internet fraud / HTTP cookie / Virtual machine / OpenVMS / Tor / VM

Poster: Tracking VM Attackers Based on Browser Fingerprinting Xiaoxi Wang1, Min Li2, Xiaoyun Li2, Qixu Liu34 1 Beijing University of Technology, Beijing, China Beijing University of Posts and Telecommunications, Beijing,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 10:57:28
102Mathematical analysis / Special functions / Mathematics / Trigonometry / Angle / Dimensionless numbers / Ratios / Analytic functions / Trigonometric functions / Sine / Taylor series / Polynomial

Poster: Secure Computations of Trigonometric and Inverse Trigonometric Functions Fattaneh Bayatbabolghani∗ , Marina Blanton† , Mehrdad Aliasgari‡ and Michael Goodrich§ ∗ Computer Science and Engineering, Univer

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-25 08:06:46
103Software / Computing / Computer programming / Integrated development environments / JetBrains / SonarQube / IntelliJ IDEA / FindBugs / Eclipse / Java / NetBeans / Cppcheck

Poster: IDE Plugins for Secure Coding Aniqua Z. Baset University of Utah Abstract—Many vulnerabilities in products and systems could

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 03:19:52
104

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 13, NO. 4, AUGUSTA Hierarchical Data Transmission Framework for Industrial Wireless Sensor and Actuator

Add to Reading List

Source URL: wirelesslab.sjtu.edu.cn

Language: English - Date: 2017-12-01 00:35:35
    105Computing / Institute of Electrical and Electronics Engineers / Piscataway /  New Jersey / ACM/IEEE Supercomputing Conference / Electrical engineering / IEEE Communications Society / Biswanath Mukherjee

    cfp-ieee-sarnoff-2017-1page-r5

    Add to Reading List

    Source URL: ewh.ieee.org

    Language: English - Date: 2017-09-06 18:07:59
    106USA Network / Television in the United States / Television

    T1: Internet of Things Session time Tue, Sep 19 10::30 Location

    Add to Reading List

    Source URL: ewh.ieee.org

    Language: English - Date: 2017-09-18 00:09:30
    107Computer security / Computing / Compiler construction / Computer programming / Software engineering / Return-oriented programming / Control-flow integrity / Code reuse / Control flow graph / Program analysis / Data-flow analysis / Cyberattack

    Poster: CRAFTED: Code Reuse Analysis for Trusted and Effective Defense Ethan Johnson Tianqin Zhao John Criswell

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-14 00:24:54
    108Computing / Configuration management / Network architecture / Software-defined networking / OpenFlow / Thorn / Load balancing / Network switch / Technology / Information and communications technology

    572 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 28,

    Add to Reading List

    Source URL: wirelesslab.sjtu.edu.cn

    Language: English - Date: 2017-12-01 00:35:34
    109Computing / Network architecture / Emerging technologies / Information and communications technology / Configuration management / Software-defined networking / Ethernet / OpenFlow / Computer architecture / Access control / Computer network / Network interface controller

    Control-data plane intelligence trade-off in SDN Yash Sinha, Siddharth Bhatia Birla Institute of Technology and Science, Pilani, India Abstract— With the decoupling of network control and data

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-13 21:01:36
    110Computer network security / Security engineering / Computing / Cyberwarfare / Honeypot / Spamming / Robotics / Robot / Cyber-physical system / Computer security / Client honeypot

    1 Poster: HoneyBot- A Honeypot for Robotic Systems Celine Irvene, Member, IEEE, David Formby, Member, IEEE, Sam Litchfield, Member, IEEE, and Raheem Beyah, Senior Member, IEEE

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-07 21:48:38
    UPDATE