Network intelligence

Results: 2949



#Item
341Security / Cyberwarfare / Computer security / National security / Crime prevention / Computer network security / Hacking / Malware / Vulnerability / Kill chain / Mobile malware / Mobile security

Mobile Exploit Intelligence Project   Dan  Guido,  Trail  of  Bits   Mike  Arpaia,  iSEC  Partners     Blackberry,    

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:17
342Computing / Network architecture / Routing / Network protocols / Routing protocols / Delay-tolerant networking / Router / Routing in delay-tolerant networking / Fisheye State Routing

Special Issue on Artificial Intelligence Underpinning MaxHopCount: A New Drop Policy to Optimize Messages Delivery Rate in Delay Tolerant Networks Youssef Harrati, Abdelmounaim Abdali Cadi Ayyad University, Faculty of S

Add to Reading List

Source URL: www.ijimai.org

Language: English - Date: 2016-03-29 07:56:35
343Computer access control / E-commerce / Supply chain management / Distribution / Computer network security / Authentication / Multi-factor authentication / Supply chain / Identity theft / Biometrics / Smart card / Security token

The global supply chain Challenges for small and midsize enterprises An Economist Intelligence Unit briefing paper sponsored by IdenTrust

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:42
344

Choreo: Network-Aware Task Placement for Cloud Applications Katrina LaCurts, Shuo Deng, Ameesh Goyal, Hari Balakrishnan MIT Computer Science and Artificial Intelligence Lab Cambridge, Massachusetts, U.S.A.

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English
    345Artificial intelligence / Systems science / Superorganisms / Systems theory / Technology / Cybernetics / Francis Heylighen / Global brain / Intelligent agent / Internet / Ephemeralization / Collective intelligence

    Towards an Intelligent Network for Matching Offer and Demand: from the sharing economy to the Global Brain Francis Heylighen Global Brain Institute Vrije Universiteit Brussel

    Add to Reading List

    Source URL: pcp.vub.ac.be

    Language: English - Date: 2016-01-05 09:11:36
    346Computational neuroscience / Artificial neural networks / Applied mathematics / Cybernetics / Cognitive science / Computer vision / Convolutional neural network / Machine learning / CNN / Artificial intelligence / Outline of object recognition / Image segmentation

    Fast R-CNN Ross Girshick Microsoft Research arXiv:1504.08083v2 [cs.CV] 27 Sep 2015

    Add to Reading List

    Source URL: arxiv.org

    Language: English - Date: 2015-09-28 20:17:36
    347Machine learning / Applied mathematics / Artificial intelligence / Learning / Artificial neural network / Computational neuroscience / Mathematical psychology / Support vector machine / Perceptron / Image segmentation / Pattern recognition / Genetic algorithm

    Special Issue on Artificial Intelligence Underpinning Editor’s Note The International Journal of Interactive Multimedia and Artificial Intelligence provides an interdisciplinary forum in which scientists and professio

    Add to Reading List

    Source URL: www.ijimai.org

    Language: English - Date: 2016-03-29 07:56:34
    348Artificial intelligence / Computational neuroscience / Cognitive science / Neuroscience / Image processing / Computer vision / Artificial intelligence applications / Convolutional neural network / Image segmentation / Activity recognition / Framing / Artificial neural network

    Viewpoint Integration for Hand-Based Recognition of Social Interactions from a First-Person View Sven Bambach1 , David J. Crandall1 , Chen Yu2 2 1

    Add to Reading List

    Source URL: vision.soic.indiana.edu

    Language: English - Date: 2015-10-07 22:43:26
    349Computing / Computer network security / Multi-agent systems / Spamming / Concurrent computing / Cyberwarfare / Botnet / Distributed computing / Computer virus / Malware / Algorithmic trading / Antivirus software

    BOT-TREK CYBER INTELLIGENCE ci.group-ib.com GROUP-IB REPORT: ANALYSIS OF ATTACKS AGAINST TRADING AND BANK CARD

    Add to Reading List

    Source URL: www.group-ib.ru

    Language: English - Date: 2016-02-08 03:52:06
    350Security / Computing / Computer security / Computer network security / Software testing / Cryptography / National security / Secure communication / InfraGard / Vulnerability / QuickTime

    The Exploit Intelligence Project Dan Guido NYM InfraGard, https://www.isecpartners.com

    Add to Reading List

    Source URL: www.trailofbits.com

    Language: English - Date: 2016-04-15 11:36:17
    UPDATE