Security University

Results: 12075



#Item
281

A More Cautious Approach to Security Against Mass Surveillance Jean Paul Degabriele1 , Pooya Farshim2 , and Bertram Poettering3 1 Royal Holloway, University of London, United Kingdom

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2015-08-07 06:07:41
    282

    National Security Studies Program University of New Mexico 9/11 Ten Years Later: Evolving Threats and US Responses September 22-23, 2011 Session1. Terrorist Threat: Global and Regional Groups Dr. Emile Nakhleh

    Add to Reading List

    Source URL: nssp.unm.edu

    - Date: 2011-11-07 13:23:38
      283

      Listen and Whisper: Security Mechanisms for BGP Lakshminarayanan Subramanian∗ , Volker Roth++ , Ion Stoica∗ , Scott Shenker∗+ , Randy H. Katz∗ ∗ University of California, Berkeley {lakme,istoica,randy}@cs.berke

      Add to Reading List

      Source URL: sahara.cs.berkeley.edu

      - Date: 2004-05-12 22:27:18
        284

        Finding Security Vulnerabilities in Java Applications with Static Analysis V. Benjamin Livshits and Monica S. Lam Computer Science Department Stanford University {livshits, lam}@cs.stanford.edu

        Add to Reading List

        Source URL: suif.stanford.edu

        - Date: 2005-07-19 02:30:55
          285

          1 University of New Mexico University Advisement and Enrichment Center, Suite 180 MSC06 3680 Albuquerque, NMNATIONAL SECURITY AND STRATEGIC ANALYSIS COMPLETION FORM for

          Add to Reading List

          Source URL: nssp.unm.edu

          - Date: 2016-03-30 15:25:53
            286

            Human Factors in Security and Privacy Zinaida Benenson Friedrich-Alexander-University Erlangen-Nuremberg, Germany Since 2012, I have been teaching a course called “Human Factors in Security

            Add to Reading List

            Source URL: cups.cs.cmu.edu

            - Date: 2015-07-17 22:36:03
              287

              Virtualized In-Cloud Security Services for Mobile Devices Jon Oberheide, Kaushik Veeraraghavan, Evan Cooke, Jason Flinn, Farnam Jahanian Electrical Engineering and Computer Science Department University of Michigan, Ann

              Add to Reading List

              Source URL: jon.oberheide.org

              - Date: 2015-10-11 18:23:19
                288

                Towards Understanding IT Security Professionals and Their Tools David Botta, Rodrigo Werlinger, Andre´ Gagne´ Konstantin Beznosov, Lee Iverson, Sidney Fels, Brian Fisher University of British Columbia, Vancouver, Canad

                Add to Reading List

                Source URL: cups.cs.cmu.edu

                - Date: 2007-06-01 12:05:22
                  289

                  Master-Arbeit im Bereich der praktischen IT-Sicherheit! UNIVERSITY OF CALIFORNIA IN SANTA BARBARA (UCSB) Die Computer Security Group der UCSB gibt ein bis zwei MasterStudierenden der IT-Sicherheit die Möglichkeit, im Wi

                  Add to Reading List

                  Source URL: www.ei.ruhr-uni-bochum.de

                  - Date: 2016-08-02 02:44:58
                    290

                    UNIVERSITY OF ARKANSAS PERSONNEL DOSIMETER REQUEST AND RADIATION EXPOSURE HISTORY 1. Name (Please print - Last name, First name, MI) 2. Social Security Number

                    Add to Reading List

                    Source URL: ehs.uark.edu

                    - Date: 2016-07-14 09:19:00
                      UPDATE