Network analysis

Results: 5019



#Item
991TRESPASS: Plug-and-Play Attacker Profiles for Security Risk Analysis Wolter Pieters∗† , Dina Hadˇziosmanovi´c∗ , Aleksandr Lenin‡ , Lorena Montoya† , and Jan Willemson‡ ∗ Delft  University of Technology,

TRESPASS: Plug-and-Play Attacker Profiles for Security Risk Analysis Wolter Pieters∗† , Dina Hadˇziosmanovi´c∗ , Aleksandr Lenin‡ , Lorena Montoya† , and Jan Willemson‡ ∗ Delft University of Technology,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-05-07 16:20:44
992helsley_zenou_feb_2011.dvi

helsley_zenou_feb_2011.dvi

Add to Reading List

Source URL: groups.haas.berkeley.edu

Language: English - Date: 2011-02-16 12:22:34
9932014 IEEE Security and Privacy Workshops  Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis Christian W. Probst Technical University of Denmark

2014 IEEE Security and Privacy Workshops Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis Christian W. Probst Technical University of Denmark

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2014-04-30 03:10:08
994Selected facility Acceleration sensors Position tags Strain sensors

Selected facility Acceleration sensors Position tags Strain sensors

Add to Reading List

Source URL: www.reconass.eu

Language: English - Date: 2015-04-28 05:42:46
995Exploring the influence of others: Modelling Social connections in contemporary Britain Understanding Society Research ConferenceJuly 2013 University of Essex Vernon Gayle, Paul S. Lambert, Dave Griffiths & Mark T

Exploring the influence of others: Modelling Social connections in contemporary Britain Understanding Society Research ConferenceJuly 2013 University of Essex Vernon Gayle, Paul S. Lambert, Dave Griffiths & Mark T

Add to Reading List

Source URL: www.camsis.stir.ac.uk

Language: English - Date: 2013-07-25 05:42:45
996Vol. 1 noPages 1–8 BIOINFORMATICS  Protein Network Inference from Multiple Genomic

Vol. 1 noPages 1–8 BIOINFORMATICS Protein Network Inference from Multiple Genomic

Add to Reading List

Source URL: www.bioreg.kyushu-u.ac.jp

Language: English - Date: 2012-03-14 12:45:12
997Measurement and methodology for mining mobile, cloud-based, social systems Jennifer Neville Departments of Computer Science and Statistics Purdue University

Measurement and methodology for mining mobile, cloud-based, social systems Jennifer Neville Departments of Computer Science and Statistics Purdue University

Add to Reading List

Source URL: dmlab.cs.umn.edu

Language: English - Date: 2012-02-23 22:37:04
998Online-Configuration of Software Visualizations with Vizz3D Thomas Panas R¨udiger Lincke

Online-Configuration of Software Visualizations with Vizz3D Thomas Panas R¨udiger Lincke

Add to Reading List

Source URL: arisa.se

Language: English - Date: 2013-01-05 09:42:26
9992014 IEEE Security and Privacy Workshops  Towards Forensic Analysis of Attacks with DNSSEC Haya Shulman and Michael Waidner Fachbereich Informatik Technische Universit¨at Darmstadt

2014 IEEE Security and Privacy Workshops Towards Forensic Analysis of Attacks with DNSSEC Haya Shulman and Michael Waidner Fachbereich Informatik Technische Universit¨at Darmstadt

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2014-04-30 03:11:51
1000Financial Secrecy Index  Australia Narrative Report on Australia Australia, not traditionally regarded as a secrecy jurisdiction,

Financial Secrecy Index Australia Narrative Report on Australia Australia, not traditionally regarded as a secrecy jurisdiction,

Add to Reading List

Source URL: financialsecrecyindex.com

Language: English - Date: 2013-11-14 04:00:01