Security University

Results: 12075



#Item
51

Using Fraud Patterns for Fraud Risk Assessment of E-services Ahmed Seid Yesuf, Jetzabel Serna-Olvera and Kai Rannenberg Deutsche Telekom Chair of Mobile Business & Multilateral Security, Goethe University Frankfurt, Fran

Add to Reading List

Source URL: m-chair.de

Language: English - Date: 2017-07-31 16:44:18
    52

    Learning is Change in Knowledge: Knowledge-based Security for Dynamic Policies Aslan Askarov Harvard University Abstract—In systems that handle confidential information,

    Add to Reading List

    Source URL: askarov.net

    Language: English - Date: 2017-05-02 08:00:35
      53

      Breaking and Fixing Gridcoin Martin Grothe, Tobias Niemann, Juraj Somorovsky, Jörg Schwenk Horst Görtz Institute for IT Security, Ruhr University Bochum {firstname.lastname}@rub.de Abstract

      Add to Reading List

      Source URL: www.nds.rub.de

      Language: English - Date: 2017-08-13 20:57:42
        54

        Security Types Preserving Compilation∗ Gilles Barthe, Tamara.Rezk, Amitabh Basu† INRIA Sophia-Antipolis, France {Gilles.Barthe,Tamara.Rezk}@sophia.inria.fr Stony Brook University, USA November 14,

        Add to Reading List

        Source URL: www-sop.inria.fr

        Language: English - Date: 2009-05-20 07:18:47
          55

          Asset-Centric Security Risk Assessment of Software Components Tobias Rauter, Andrea Höller, Nermin Kajtazovic, Christian Kreiner Institute for Technical Informatics Graz University of Technology Graz, Austria

          Add to Reading List

          Source URL: mils-workshop-2016.mils.community

          Language: English - Date: 2016-01-15 03:31:49
            56

            The National Security Archive The George Washington University Gelman Library, SuiteH Street, N.W. Washington, D.C

            Add to Reading List

            Source URL: nsarchive2.gwu.edu

            Language: English - Date: 2017-08-10 13:59:44
              57

              Malicious Code on Java Card Smartcards: Attacks and Countermeasures Wojciech Mostowski and Erik Poll Digital Security (DS) group, Department of Computing Science Radboud University Nijmegen, The Netherlands {woj,erikpoll

              Add to Reading List

              Source URL: ceres.hh.se

              Language: English - Date: 2015-05-16 14:49:15
                58

                The Misuse of Android Unix Domain Sockets and Security Implications Yuru Shao† , Jason Ott∗ , Yunhan Jack Jia† , Zhiyun Qian∗ , Z. Morley Mao† † University of Michigan, ∗ University of California, Riversid

                Add to Reading List

                Source URL: www.cs.ucr.edu

                Language: English - Date: 2016-10-31 00:33:07
                  59

                  Annual Security Report Indiana University School of MedicineEvansville September I n d i a n a

                  Add to Reading List

                  Source URL: protect.iu.edu

                  Language: English - Date: 2018-06-25 10:18:30
                    UPDATE