Nicholas

Results: 5905



#Item
781

Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors Hilmi G¨unes¸ Kayacık∗ , Mike Just∗ , Lynne Baillie∗ , David Aspinall† and Nicholas Micallef∗ ∗ Glasg

Add to Reading List

Source URL: www.mostconf.org

Language: English - Date: 2014-05-17 09:17:31
    782

    Package ‘hexbin’ August 19, 2015 VersionDateTitle Hexagonal Binning Routines Author Dan Carr <>, ported by Nicholas

    Add to Reading List

    Source URL: cran.fhcrc.org

    Language: English - Date: 2015-08-19 11:28:23
      783Computer network security / Cyberwarfare / Computer security / Computing / Computer worm / Intrusion detection system / Anti-worm / Firewall / Computer network / Malware / Witty / Worm

      Worms vs. Perimeters: The Case for Hard-LANs Nicholas Weaver Dan Ellis

      Add to Reading List

      Source URL: www1.icsi.berkeley.edu

      Language: English - Date: 2012-09-26 16:43:10
      784

      Electronic Medical Record Systems for Developing Countries: Review Nicholas A. Kalogriopoulos, Jonathan Baran, Amit J. Nimunkar and John G. Webster  Abstract—Countries around the world are in need of

      Add to Reading List

      Source URL: ewh.slc.engr.wisc.edu

      Language: English - Date: 2009-10-27 20:30:50
        785

        Landscape-­Scale Conservation Planning of the Ewaso Nyiro: A Model for Land Use Planning in Kenya? Karl A. Didier, Alayne Cotterill, Iain Douglas-­Hamilton, Laurence Frank, Nicholas J. Georgiadis, Max Graham, Festus Ih

        Add to Reading List

        Source URL: savetheelephants.org

        Language: English - Date: 2014-04-14 03:48:22
          786

          IMPROVING THE PREDICTION OF PHARMACOGENES USING TEXT-DERIVED DRUG-GENE RELATIONSHIPS YAEL GARTEN§ Stanford Biomedical Informatics Training Program, Stanford University, Stanford, CA 94305, USA NICHOLAS P TATONETTI§

          Add to Reading List

          Source URL: tatonetti.com

          Language: English - Date: 2015-08-20 18:06:25
            787

            NEWS RELEASE Women’s Center & Shelter of Greater Pittsburgh P.O. Box 9024, Pittsburgh, PA 15224 • • F: Contact: Barbara Nicholas Phone: E-mail:

            Add to Reading List

            Source URL: www.newtonconsulting.com

            Language: English - Date: 2014-10-17 13:06:16
              788Computing / Computer network security / Cyberwarfare / Data security / Transmission Control Protocol / Packet injection / Sandvine / Firewall / Traffic flow / Internet protocol suite / Idle scan

              Detecting Forged TCP Reset Packets Nicholas Weaver ICSI Robin Sommer

              Add to Reading List

              Source URL: www1.icsi.berkeley.edu

              Language: English - Date: 2012-09-26 16:43:05
              789Computing / Network architecture / Internet / Network protocols / Ethernet / Transmission Control Protocol / Cache / Packet processing / Virtual LAN / Ethernet frame / Internet Protocol / Network switch

              The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention Nicholas Weaver Vern Paxson

              Add to Reading List

              Source URL: www1.icsi.berkeley.edu

              Language: English - Date: 2012-09-26 16:43:02
              790

              (no nightlife whatsoever?) Nicholas Hatfull Armando Testa Nocero Umbro 1991

              Add to Reading List

              Source URL: flatness.eu

              Language: English - Date: 2014-07-01 15:34:44
                UPDATE