Poster

Results: 19881



#Item
31Poster: Understanding Free-riding Attacks in Internet Zero-rating Services Zhiheng Liu, Zhen Zhang, Shihao Jing, Zhaohan Xi and Yinzhi Cao Lehigh University 27 Memorial Dr W, Bethlehem, PA, USA [zhl416][zhza16][shj316][z

Poster: Understanding Free-riding Attacks in Internet Zero-rating Services Zhiheng Liu, Zhen Zhang, Shihao Jing, Zhaohan Xi and Yinzhi Cao Lehigh University 27 Memorial Dr W, Bethlehem, PA, USA [zhl416][zhza16][shj316][z

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 04:51:38
32Poster: Detecting Command and Control Servers of Botnet With Randomized Traffic Di Wu1,2, Binxing Fang3, Fangjiao Zhang1,2 1 (Institute of Information Engineering, Chinese Academy of Sciences) 2 (School of Cyber Security

Poster: Detecting Command and Control Servers of Botnet With Randomized Traffic Di Wu1,2, Binxing Fang3, Fangjiao Zhang1,2 1 (Institute of Information Engineering, Chinese Academy of Sciences) 2 (School of Cyber Security

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-11 13:01:38
33Poster: Can Johnny Authenticate? Elham Vaziripour, Ray Clinton, Justin Wu, Mark O’Neill, Jordan Whitehead, Scott Heidbrink, Kent Seamons, Daniel Zappala Computer Science Department, Brigham Young University elhamvaziri

Poster: Can Johnny Authenticate? Elham Vaziripour, Ray Clinton, Justin Wu, Mark O’Neill, Jordan Whitehead, Scott Heidbrink, Kent Seamons, Daniel Zappala Computer Science Department, Brigham Young University elhamvaziri

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-15 03:43:28
34Poster: Multi-source data analysis for SQL injection detection Kevin Ross, Melody Moh, Teng-Sheng Moh Jason Yao

Poster: Multi-source data analysis for SQL injection detection Kevin Ross, Melody Moh, Teng-Sheng Moh Jason Yao

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 00:41:20
35Poster: Guard Sets in Tor Using AS Relationships Mohsen Imani Armon Barton  Matthew Wright

Poster: Guard Sets in Tor Using AS Relationships Mohsen Imani Armon Barton Matthew Wright

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-10 21:07:00
36Poster: Security Analysis of HSTS Implementation in Browsers Yan Jia1,2, Yuqing Zhang2,1 1  2

Poster: Security Analysis of HSTS Implementation in Browsers Yan Jia1,2, Yuqing Zhang2,1 1 2

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-14 22:48:20
37WQ Russia Quant Researcher JD Poster A4 V4

WQ Russia Quant Researcher JD Poster A4 V4

Add to Reading List

Source URL: www.worldquant.ru

Language: English - Date: 2017-05-26 09:12:28
38Poster: PCA-based statistical anomaly detection of reactive jamming in WiFi networks Ni An Vinod Mishra

Poster: PCA-based statistical anomaly detection of reactive jamming in WiFi networks Ni An Vinod Mishra

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 22:38:18
39SIGCSE 2011 Poster Proposal: Universal Design for Learning in CS1 Suzanne Rivoire Department of Computer Science Sonoma State University, Rohnert Park, CA, USA

SIGCSE 2011 Poster Proposal: Universal Design for Learning in CS1 Suzanne Rivoire Department of Computer Science Sonoma State University, Rohnert Park, CA, USA

Add to Reading List

Source URL: rivoire.cs.sonoma.edu

Language: English - Date: 2017-05-29 18:45:15