Security University

Results: 12075



#Item
41Computer network security / Cyberwarfare / Computer security / Computing / Computer security software / Idle scan / Denial-of-service attack / Transmission Control Protocol / Stateful firewall / Internet censorship / Great Firewall / Internet protocol suite

Augur: Internet-Wide Detection of Connectivity Disruptions Paul Pearce†∗ , Roya Ensafi§∗ , Frank Li† , Nick Feamster§ , Vern Paxson† † University of California, Berkeley § Princeton University

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:56:26
42

The National Security Archive The George Washington University Gelman Library, SuiteH Street, N.W. Washington, D.C

Add to Reading List

Source URL: nsarchive2.gwu.edu

Language: English - Date: 2017-08-10 13:59:12
    43

    Privacy-Preserving Network Provenance Yuankai Zhang Adam O’Neill Georgetown University

    Add to Reading List

    Source URL: security.cs.georgetown.edu

    Language: English - Date: 2017-09-01 10:50:49
      44

      X-Force: Force-Executing Binary Programs for Security Applications Fei Peng, Zhui Deng, Xiangyu Zhang, and Dongyan Xu, Purdue University; Zhiqiang Lin, The University of Texas at Dallas; Zhendong Su, University of Califo

      Add to Reading List

      Source URL: web.cse.ohio-state.edu

      Language: English - Date: 2018-01-07 13:07:05
        45

        UNESCO-JASTIP Joint Symposium on Intra-Regional Water Security and Disaster Management Marjorie C. Turiano, Eric C. Cruz Institute of Civil Engineering University of the Philippines Diliman

        Add to Reading List

        Source URL: jastip.org

        Language: English - Date: 2018-03-01 03:27:30
          46

          Annual Security Report Indiana University East, Danielson Center & Lawrenceburg Center September

          Add to Reading List

          Source URL: protect.iu.edu

          Language: English - Date: 2018-06-25 10:18:30
            47

            Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards Wojciech Mostowski? and Pim Vullers?? Institute for Computing and Information Sciences, Digital Security group, Radboud University Nijmegen, The N

            Add to Reading List

            Source URL: ceres.hh.se

            Language: English - Date: 2015-05-16 14:56:14
              48

              The National Security Archive The George Washington University Gelman Library, SuiteH Street, N.W. Washington, D.C

              Add to Reading List

              Source URL: nsarchive2.gwu.edu

              Language: English - Date: 2017-08-10 13:59:48
                49

                Warner University Annual Security and Fire Report 2017

                Add to Reading List

                Source URL: www.warner.edu

                Language: English
                  50

                  2014 IEEE Symposium on Security and Privacy SoK: Introspections on Trust and the Semantic Gap Bhushan Jain, Mirza Basim Baig, Dongli Zhang, Donald E. Porter, and Radu Sion Stony Brook University {bpjain, mbaig, dozhang,

                  Add to Reading List

                  Source URL: oaklandsok.github.io

                  Language: English - Date: 2018-03-14 15:33:55
                    UPDATE