IEEE

Results: 22018



#Item
71Artificial neural networks / Computational neuroscience / Applied mathematics / Cybernetics / Neuroscience / Convolutional neural network / Long short-term memory / Recurrent neural network / Artificial intelligence

Poster: Summarized Network Behavior Prediction Shih-Chieh Su∗ Qualcomm Inc. San Diego, CA, 92121 Email: ∗

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-26 01:29:24
72Computing / Software engineering / Computer programming / Programming languages / High-level programming languages / Concurrent programming languages / Java platform / Java / Call stack / Stack / Java Class Library / Go

Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation Philipp Holzinger∗ , Ben Hermann† , Johannes Lerch† , Eric Bodden‡ and Mira Mezini† ∗ Fraunhofer SIT, Email: philipp.holzinger@sit

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:15
73Cryptocurrencies / Computing / Bitcoin / Internet / Free software / Alternative currencies / Blockchains / Internet security / BGP hijacking / Mining pool / Ghash.io / Denial-of-service attack

Hijacking Bitcoin: Routing Attacks on Cryptocurrencies https://btc-hijack.ethz.ch Maria Apostolaki Aviv Zohar

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:18
74Terms of service / Software / Computing / Technology / Social networking services / Microblogging / Real-time web / Text messaging / Twitter / Privacy / Internet privacy / Medical privacy

Poster - Using Twitter to Identify Privacy Information Esha Sharma1 and Jessica Staddon 2 Abstract— We are building the first comprehensive database

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-11 01:15:34
75Intellectual property law / Copyright law / Data / Copyright law of the United States / Copyright / Derivative work / Institute of Electrical and Electronics Engineers / Law / Author / Information / Copyright Act of Ghana / Authorship and ownership in copyright law in Canada

IEEE COPYRIGHT LICENSE FORM FOR LIMITED USE WITH IEEE COMPUTER SOCIETY’S EXPERIMENTAL “DELAYED-OPEN ACCESS” MODEL TITLE OF WORK (hereinafter, "the Work"): AUTHOR(S): IEEE PUBLICATION TITLE: 2017 IEEE Symposium on S

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-03-16 07:17:53
76Piscataway /  New Jersey / IEEE Spectrum / Institute of Electrical and Electronics Engineers / ZX Spectrum / Computing / Science and technology in the United States / IEEE Communications Society

2018 spectrum.ieee.org http://advertise.ieee.org/spectrum IEEE Spectrum —

Add to Reading List

Source URL: advertise.ieee.org

Language: English - Date: 2018-04-12 16:04:33
77Computer programming / Software engineering / Mathematical logic / Formal methods / Predicate logic / Opaque predicate / Computability theory / Predicate / Satisfiability modulo theories / Stack / Disassembler / FO

Backward-Bounded DSE: Targeting Infeasibility Questions on Obfuscated Codes? Sébastien Bardin Robin David

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:56:28
78Computing / Computer architecture / System software / Recall / Android / Pattern / Short-term memory / Student's t-test

SysPal: System-guided Pattern Locks for Android Geumhwan Cho1 , Jun Ho Huh2 , Junsung Cho1 , Seongyeol Oh1 , Youngbae Song1 , Hyoungshick Kim1 1 Department of Computer Science and Engineering, Sungkyunkwan University, So

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:02:19
79Computing / Data security / Computer security / Internet privacy / Digital rights / Human rights / Terms of service / Law / Privacy / Information privacy / Information security / Proxy

Use Privacy in Data-Driven Systems Theory and Experiments with Machine Learnt Programs Anupam Datta CMU

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-15 05:23:56
80Cryptography / Transport Layer Security / Public key infrastructure / Public-key cryptography / Cryptographic protocols / Key management / Online Certificate Status Protocol / Certificate revocation list / X.509 / Certificate authority / OCSP stapling / Public key certificate

CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers James Larisch∗ Bruce M. Maggs‡ ∗ Northeastern

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:56:42
UPDATE