Information security

Results: 50180



#Item
1Multi-touch Authentication Using Hand Geometry and Behavioral Information Yunpeng Song† Zhongmin Cai†*

Multi-touch Authentication Using Hand Geometry and Behavioral Information Yunpeng Song† Zhongmin Cai†*

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:59
2HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 23:38:22
3Shaanan N Cohney , https://cohney.info , Updated 16 September 2018 EDUCATION & WORK PhD Computer and Information Science Computer and Information Security

Shaanan N Cohney , https://cohney.info , Updated 16 September 2018 EDUCATION & WORK PhD Computer and Information Science Computer and Information Security

Add to Reading List

Source URL: cohney.info

Language: English - Date: 2018-09-29 19:30:48
4INFORMATION  Dear Customer, Please be informed that in view for increasing the safety of card use abroad, as of 19 January 2016 the Bank enters new security requirements in force. If you travel to a country outside of Eu

INFORMATION Dear Customer, Please be informed that in view for increasing the safety of card use abroad, as of 19 January 2016 the Bank enters new security requirements in force. If you travel to a country outside of Eu

Add to Reading List

Source URL: www.raiffeisen.hu

    5Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

    Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-13 08:13:56
    6Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

    Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-24 15:44:20
    7Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2  Institute of Information Engineering, Chinese Academy of Sciences

    Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of Sciences

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-12 09:17:38
    8NPPA PRIVACY POLICY NPP Australia Limited (NPPA) is committed to protecting and maintaining the privacy, accuracy and security of an individual’s personal information. This Privacy Policy describes how NPPA manages the

    NPPA PRIVACY POLICY NPP Australia Limited (NPPA) is committed to protecting and maintaining the privacy, accuracy and security of an individual’s personal information. This Privacy Policy describes how NPPA manages the

    Add to Reading List

    Source URL: www.nppa.com.au

    Language: English - Date: 2018-02-26 22:05:21
    9Poster - Using Twitter to Identify Privacy Information Esha Sharma1 and Jessica Staddon 2  Abstract— We are building the first comprehensive database

    Poster - Using Twitter to Identify Privacy Information Esha Sharma1 and Jessica Staddon 2 Abstract— We are building the first comprehensive database

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-11 01:15:34
    10State Corporation Commission - Audit of Information Security and Travel and Small Purchase Charge Card Expenses for the year ended June 30, 2017

    State Corporation Commission - Audit of Information Security and Travel and Small Purchase Charge Card Expenses for the year ended June 30, 2017

    Add to Reading List

    Source URL: www.apa.virginia.gov

    Language: English - Date: 2018-10-25 10:47:54