Security University

Results: 12075



#Item
211

Welcome to the HIPAA, Privacy & Security Training Module THIS TRAINING MODULE IS APPROVED FOR NON-COMMERCIAL USE ONLY. Copyright protected by the University of North Carolina at Chapel Hill,

Add to Reading List

Source URL: www.unc.edu

- Date: 2014-12-12 09:57:19
    212

    Adversarial Diversity and Hard Positive Generation Andras Rozsa, Ethan M. Rudd, and Terrance E. Boult∗ University of Colorado at Colorado Springs Vision and Security Technology (VAST) Lab {arozsa,erudd,tboult}@vast.ucc

    Add to Reading List

    Source URL: www.cv-foundation.org

    - Date: 2016-05-30 10:52:54
      213

      New Mexico State University Carlsbad 2016 Annual Security Report Covering: NMSU Carlsbad-With Statistics for

      Add to Reading List

      Source URL: carlsbad.nmsu.edu

      - Date: 2016-10-13 10:39:45
        214

        CONTRACTOR & VENDOR COMPLIANCE REQUIREMENTS SECURITY AND IMMIGRATION To All Prospective Contractors/Vendors: Georgia law 1 generally requires contractors who provide services to Kennesaw State University to furnish a not

        Add to Reading List

        Source URL: ofm.kennesaw.edu

        - Date: 2015-12-17 08:28:29
          215

          Causality, Composition, and the Security of Cyberphysical Systems Sibylle Fr¨ oschle OFFIS & University of Oldenburg

          Add to Reading List

          Source URL: www.ips.tu-braunschweig.de

          - Date: 2013-08-13 02:42:33
            216

            Grailog 1.0: Graph-Logic Visualization of Ontologies and Rules Harold Boley National Research Council, Security and Disruptive Technologies University of New Brunswick, Faculty of Computer Science Fredericton, NB, Canada

            Add to Reading List

            Source URL: www.cs.unb.ca

            - Date: 2013-05-12 19:46:42
              217

              Derivation of Domain-specific Architectural Knowledge Views from Governance and Security Compliance Metadata Huy Tran, Ioanna Lytra, Uwe Zdun Software Architecture Research Group University of Vienna, Austria E-Mail: fir

              Add to Reading List

              Source URL: eprints.cs.univie.ac.at

              - Date: 2013-12-19 04:46:07
                218

                2016 ANNUAL CAMPUS SECURITY REPORT & ANNUAL FIRE SAFETY REPORT Texas Christian University Police Department

                Add to Reading List

                Source URL: police.tcu.edu

                - Date: 2016-10-07 19:11:57
                  219

                  Solving binary MQ with Grover’s algorithm Peter Schwabe and Bas Westerbaan ? Digital Security Group, Radboud University

                  Add to Reading List

                  Source URL: westerbaan.name

                  - Date: 2016-09-04 16:19:31
                    220

                    The Security of NTP’s Datagram Protocol Aanchal Malhotra∗ , Matthew Van Gundy† , Mayank Varia∗ , Haydn Kennedy∗ , Jonathan Gardner† , Sharon Goldberg∗ ∗ Boston University † Cisco (ASIG) Abstract—For d

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2016-10-23 13:07:09
                      UPDATE