Institute of Engineering

Results: 17160



#Item
1Constraint programming / Mathematics / Lattice theory / Mathematical optimization / Applied mathematics / Constraint satisfaction / Local consistency / Semilattice / Linear programming / Optimization problem / Constraint / Feasible region

in Knowledge Engineering Reviews, 2001 Synthesis of EÆcient Constraint Satisfaction Programs Stephen J. Westfold and Douglas R. Smith Kestrel Institute 3260 Hillview Avenue

Add to Reading List

Source URL: www.kestrel.edu

Language: English - Date: 2012-08-02 20:59:14
2Systems science / Carnegie Mellon University / Systems engineering / Systems theory / Cyberwarfare / Software Engineering Institute / System of systems / Carnegie Mellon Silicon Valley / Software engineering / Pittsburgh / Science and technology in the United States

BOXES: Abstract Domain of Boxes Arie Gurfinkel and Sagar Chaki Software Engineering Institute Carnegie Mellon University January 28, 2011

Add to Reading List

Source URL: arieg.bitbucket.io

Language: English - Date: 2018-10-19 18:15:18
3Cryptography / Obfuscation / Computer security / Password / Security / Cyberwarfare / Salt / Identity management / Password policy / Password fatigue

Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 08:13:56
4Security / Security breaches / Prevention / Ransomware / Cybercrime / Malware / Locky / Computer security

Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-24 15:44:20
5Concurrent computing / Computer network security / Multi-agent systems / Spamming / Computing / Cybercrime / Distributed computing / Malware / Botnet / Peer-to-peer / Social peer-to-peer processes

Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of Sciences

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 09:17:38
6Technology / Computing / World Wide Web / Social media / Internet vigilantism / Internet-based activism / Cyberspace / Internet culture / Online shaming / Twitter / Tweet / Hashtag

Look Before You Shame: A Study on Shaming Activities on Twitter Rajesh Basak, Niloy Ganguly, Shamik Sural, Soumya K Ghosh Department of Computer Science & Engineering, Indian Institute of Technology Kharagpur Kharagpur,

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 00:23:08
7Graph theory / Computing / Resource Description Framework / Query languages / Mathematics / Discrete mathematics / SPARQL / FO / Graph / Directed graph / RDFLib

For the DISTINCT Clause of SPARQL Queries Medha Atre Dept. of Computer Science and Engineering Indian Institute of Technology, Kanpur, India

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 00:50:47
8Functional predicate / Model theory / Symbol / Limit of a function / Universal quantification / Mathematical logic / Mathematics / Logic

A Relational Encoding for a Clash-Free Subset of ASMs Gerhard Schellhorn, Gidon Ernst, J¨org Pf¨ahler, and Wolfgang Reif Institute for Software and Systems Engineering University of Augsburg, Germany {schellhorn,ernst,

Add to Reading List

Source URL: www.isse.uni-augsburg.de

Language: English - Date: 2017-01-11 10:50:05
9Computer network security / Computing / Cyberwarfare / Multi-agent systems / Spamming / Cybercrime / Botnets / Intrusion detection system / Server / Cluster analysis / Internet bot / Computer security

Poster: Detecting Command and Control Servers of Botnet With Randomized Traffic Di Wu1,2, Binxing Fang3, Fangjiao Zhang1,2 1 (Institute of Information Engineering, Chinese Academy of Sciences) 2 (School of Cyber Security

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-11 13:01:38
10Cryptography / Public-key cryptography / Transport Layer Security / Cryptographic software / Secure communication / Cryptographic protocols / Mbed TLS / Cipher suite / OpenSSL / Forward secrecy / Post-quantum cryptography / HTTPS

1 Postquantum SSL/TLS for embedded systems Yun-An Chang† , Ming-Shing Chen†‡ , Jong-shian Wu† , Bo-Yin Yang‡ , of Electrical Engineering, National Taiwan University, Taiwan ‡ Institute of Information Science

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2014-12-08 15:44:41
UPDATE