Poster

Results: 19881



#Item
41Web analytics / Data mining / Web mining / World Wide Web / Sequence / Session / Information technology / Economy / Information

C:/Users/Murat/Google Drive/Desktop/Research/Complete-SRA/WWW-2016-Camera-Ready/poster.dvi

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 00:25:40
42Computing / System software / Software / Internet privacy / Computer network security / Device fingerprint / Internet fraud / HTTP cookie / Virtual machine / OpenVMS / Tor / VM

Poster: Tracking VM Attackers Based on Browser Fingerprinting Xiaoxi Wang1, Min Li2, Xiaoyun Li2, Qixu Liu34 1 Beijing University of Technology, Beijing, China Beijing University of Posts and Telecommunications, Beijing,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 10:57:28
43Mathematical analysis / Special functions / Mathematics / Trigonometry / Angle / Dimensionless numbers / Ratios / Analytic functions / Trigonometric functions / Sine / Taylor series / Polynomial

Poster: Secure Computations of Trigonometric and Inverse Trigonometric Functions Fattaneh Bayatbabolghani∗ , Marina Blanton† , Mehrdad Aliasgari‡ and Michael Goodrich§ ∗ Computer Science and Engineering, Univer

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-25 08:06:46
44Software / Computing / Computer programming / Integrated development environments / JetBrains / SonarQube / IntelliJ IDEA / FindBugs / Eclipse / Java / NetBeans / Cppcheck

Poster: IDE Plugins for Secure Coding Aniqua Z. Baset University of Utah Abstract—Many vulnerabilities in products and systems could

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 03:19:52
45Computer security / Computing / Compiler construction / Computer programming / Software engineering / Return-oriented programming / Control-flow integrity / Code reuse / Control flow graph / Program analysis / Data-flow analysis / Cyberattack

Poster: CRAFTED: Code Reuse Analysis for Trusted and Effective Defense Ethan Johnson Tianqin Zhao John Criswell

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 00:24:54
46Computer network security / Security engineering / Computing / Cyberwarfare / Honeypot / Spamming / Robotics / Robot / Cyber-physical system / Computer security / Client honeypot

1 Poster: HoneyBot- A Honeypot for Robotic Systems Celine Irvene, Member, IEEE, David Formby, Member, IEEE, Sam Litchfield, Member, IEEE, and Raheem Beyah, Senior Member, IEEE

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-07 21:48:38
47Botnets / Computer network security / Multi-agent systems / Spamming / Computing / Cybercrime / Concurrent computing / Domain generation algorithm / Srizbi botnet / Hidden Markov model / Cutwail botnet

1 Poster: Zero-day Botnet Domain Generation Algorithm (DGA) Detection using Hidden Markov Models (HMMs) Yu Fu, Lu Yu, Richard Brooks Senior Member, IEEE

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-05 00:02:48
48Finance / Economy / Money / Data management / Alternative investment management companies / WorldQuant / Valuation / Quantitative analyst / Financial analyst / Securities research / Big data / Data

WQ Russia Research Analyst JD Poster A4 V7

Add to Reading List

Source URL: www.worldquant.ru

Language: English - Date: 2017-05-26 09:12:31
49System software / Computing / Utility software / Computer network security / Computer security / Configuration management / Network architecture / Software-defined networking / Intrusion detection system / Snort / OpenFlow / Traffic flow

Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks Sunghwan Kim, Seunghyun Yoon, and Hyuk Lim School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technol

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 15:46:40
50Software testing / Computer security / Security engineering / Cyberwarfare / Cybercrime / Computer network security / Fuzzing / Software bugs / Application security / Vulnerability / Internet of things / Heartbleed

Poster: IoTcube: An Automated Analysis Platform for Finding Security Vulnerabilities Seulbae Kim, Seunghoon Woo, Heejo Lee, Hakjoo Oh Department of Computer Science and Engineering Korea University Seoul, Korea

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-21 15:07:31
UPDATE