Security University

Results: 12075



#Item
981

Quantitative Security Analysis for Programs with Low Input and Noisy Output Tri Minh Ngo and Marieke Huisman University of Twente, Netherlands

Add to Reading List

Source URL: wwwhome.ewi.utwente.nl

Language: English - Date: 2013-12-05 10:06:04
    982

    Fault-Tolerant Non-interference Extended Version Filippo Del Tedesco, Alejandro Russo, and David Sands Chalmers University of Technology, Sweden Abstract. This paper is about ensuring security in unreliable systems. We

    Add to Reading List

    Source URL: www.cse.chalmers.se

    Language: English - Date: 2014-03-01 20:19:01
      983

      May I? - Content Security Policy Endorsement for Browser Extensions Daniel Hausknecht1 , Jonas Magazinius1,2,3 , and Andrei Sabelfeld1 1 Chalmers University of Technology

      Add to Reading List

      Source URL: www.cse.chalmers.se

      Language: English - Date: 2015-04-21 10:00:15
        984Security / Background check / Employment / Law enforcement / Recruitment / Criminal record / FBI Name Check

        Revised University of Illinois Policy On Background Checks I. Purpose

        Add to Reading List

        Source URL: nessie.uihr.uillinois.edu

        Language: English - Date: 2016-01-25 11:24:37
        985

        GURU GOBIND SINGH INDRAPRASTHA UNIVERSITY ESTATE & SECURITY BRANCH SECTOR 16-C, DWARKA, NEW DELHI – , F.No. GGSIPU/E&S/Estate

        Add to Reading List

        Source URL: ipu.ac.in

        Language: English - Date: 2016-01-16 15:28:28
          986

          The Eighth Workshop on the Social Implications of National Security: Remotely Piloted Airborne Vehicles and Related TechnologiesSeptember 2014 The University of Melbourne

          Add to Reading List

          Source URL: sites.ieee.org

          Language: English - Date: 2014-12-11 10:54:25
            987

            A Tune-up for Tor: Improving Security and Performance in the Tor Network Robin Snader Department of Computer Science University of Illinois at Urbana–Champaign Nikita Borisov

            Add to Reading List

            Source URL: www.isoc.org

            Language: English - Date: 2008-01-28 08:34:00
              988

              Professor Ravi Sandhu University of Texas at San Antonio Executive Director and Founder, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security

              Add to Reading List

              Source URL: profsandhu.com

              Language: English - Date: 2016-01-19 19:26:33
                989Criminal records / Background check / Employment / Law enforcement / Recruitment / Security / University of Illinois at UrbanaChampaign

                University of Illinois at Urbana-Champaign’s Guidelines for Implementing the University-Wide Background Check Policy The “University of Illinois Background Check Policy” (“the Policy”) was approved by the Board

                Add to Reading List

                Source URL: shr.illinois.edu

                Language: English - Date: 2015-11-02 08:36:40
                990Law enforcement / Universities and colleges / Academia / Bethlehem /  Pennsylvania / Law enforcement in the United States / Lehigh University / Murder of Jeanne Clery / Crime / Campus police / Fayetteville /  Arkansas / Uniform Crime Reports / Clery Act

                2003 Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Report

                Add to Reading List

                Source URL: uapd.uark.edu

                Language: English - Date: 2014-12-03 11:09:33
                UPDATE