Poster

Results: 19881



#Item
31Computing / Internet / Computer network security / Internet privacy / Information and communications technology / Transport Layer Security / Cryptographic protocols / Secure communication / HTTP cookie / HTTPS / Deep packet inspection / Man-in-the-middle attack

Poster: Understanding Free-riding Attacks in Internet Zero-rating Services Zhiheng Liu, Zhen Zhang, Shihao Jing, Zhaohan Xi and Yinzhi Cao Lehigh University 27 Memorial Dr W, Bethlehem, PA, USA [zhl416][zhza16][shj316][z

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 04:51:38
32Computer network security / Computing / Cyberwarfare / Multi-agent systems / Spamming / Cybercrime / Botnets / Intrusion detection system / Server / Cluster analysis / Internet bot / Computer security

Poster: Detecting Command and Control Servers of Botnet With Randomized Traffic Di Wu1,2, Binxing Fang3, Fangjiao Zhang1,2 1 (Institute of Information Engineering, Chinese Academy of Sciences) 2 (School of Cyber Security

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-11 13:01:38
33Software / Computing / Computer-mediated communication / Instant messaging clients / Social media / Videotelephony / Computer access control / Cross-platform software / Signal / WhatsApp / Instant messaging / Authentication

Poster: Can Johnny Authenticate? Elham Vaziripour, Ray Clinton, Justin Wu, Mark O’Neill, Jordan Whitehead, Scott Heidbrink, Kent Seamons, Daniel Zappala Computer Science Department, Brigham Young University elhamvaziri

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-15 03:43:28
34Data management / Computing / Software / Relational database management systems / Cross-platform software / MySQL / Weka / SQL injection / Database server / Database / Application server / Code injection

Poster: Multi-source data analysis for SQL injection detection Kevin Ross, Melody Moh, Teng-Sheng Moh Jason Yao

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 00:41:20
35Internet / Computing / Free software / Dark web / Secure communication / Tor / Point guard / Guard mounting

Poster: Guard Sets in Tor Using AS Relationships Mohsen Imani Armon Barton Matthew Wright

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-10 21:07:00
36Computing / Software / Cryptography / Transport Layer Security / HTTP Strict Transport Security / HTTP Public Key Pinning / HTTP cookie / Browser security / HTTPS / Public key certificate / Google Chrome / Firefox

Poster: Security Analysis of HSTS Implementation in Browsers Yan Jia1,2, Yuqing Zhang2,1 1 2

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-14 22:48:20
37Finance / Hedge funds / WorldQuant / Quantitative analyst / Money / Quantitative research / Financial market / Investment

WQ Russia Quant Researcher JD Poster A4 V4

Add to Reading List

Source URL: www.worldquant.ru

Language: English - Date: 2017-05-26 09:12:28
38Dimension reduction / Principal component analysis / Anomaly

Poster: PCA-based statistical anomaly detection of reactive jamming in WiFi networks Ni An Vinod Mishra

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 22:38:18
39Education / Learning / Human behavior / Pedagogy / Segregation / Educational psychology / Higher education / Universal Design for Learning / Philosophy of education / Educational technology / Inclusion / Accessibility

SIGCSE 2011 Poster Proposal: Universal Design for Learning in CS1 Suzanne Rivoire Department of Computer Science Sonoma State University, Rohnert Park, CA, USA

Add to Reading List

Source URL: rivoire.cs.sonoma.edu

Language: English - Date: 2017-05-29 18:45:15
UPDATE