Security analysis

Results: 6956



#Item
281Social inequality / Data management / Big data / Formal sciences / Transaction processing / Analytics / Machine learning / Bias / Discrimination / Equal opportunity / Computer security / Data analysis

Big Data: A Report on Algorithmic Systems, Opportunity, and Civil Rights Executive Office of the President May 2016

Add to Reading List

Source URL: www.whitehouse.gov

Language: English - Date: 2016-05-04 14:06:37
282

Press Release Paris, Thursday 21st January 2016 Cryptosense Announces Availability of Java Crypto Analysis Tool Cryptosense SA has released a new tool for identifying cryptographic security weaknesses in Java application

Add to Reading List

Source URL: cryptosense.com

Language: English - Date: 2016-01-29 11:19:24
    283

    A Modular Security Analysis of the TLS Handshake Protocol P. Morrissey, N.P. Smart and B. Warinschi Abstract We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2008-06-02 08:20:40
      284

      INSE 6150 Security Evaluation Methodologies Vulnerability Analysis Prof. Jeremy Clark Presented by: Gaby Dagher The lecture notes are based on materials by Dr. M. Debbabi

      Add to Reading List

      Source URL: users.encs.concordia.ca

      Language: English - Date: 2014-03-10 11:18:42
        285United Nations Committee on the Peaceful Uses of Outer Space / Disaster preparedness / Security / Computer security / Emergency management / Risk management / Threat / Risk analysis / Disaster response

          Executive Summary Workshop on a Near-Earth Object Information, Warning, and Analysis Network Mexico City, 18-20 January 10

        Add to Reading List

        Source URL: www.space-explorers.org

        Language: English - Date: 2010-11-16 14:22:55
        286Academia / Knowledge / Science and technology / Lattice theory / Information science / Scientific method / Computer graphics / Infographics / Formal concept analysis / Electronic submission / Informatics / Data analysis

        ABC springer.com Security Informatics Special Issue on

        Add to Reading List

        Source URL: old.security-informatics.com

        Language: English - Date: 2014-06-27 07:03:36
        287

        MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced ­Symbolic Analysis Ruowen Wang, Peng Ning, Tao Xie, and Quan Chen, North Carolina State University This paper is included in the Proceed

        Add to Reading List

        Source URL: www.usenix.org

        Language: English - Date: 2013-09-28 11:40:36
          288

          Automated vulnerability analysis of zero sized heap allocations April 2010 Julien Vanegue () Microsoft Security Engineering Center (MSEC)

          Add to Reading List

          Source URL: 2010.hackitoergosum.org

          Language: English - Date: 2010-04-23 08:06:57
            289

            Neither Snow Nor Rain Nor MITM...An Empirical Analysis of Email Delivery Security

            Add to Reading List

            Source URL: conferences.sigcomm.org

            Language: English - Date: 2015-09-25 07:00:28
              290Cryptography / Criminology / Forensic science / Heuristics / Online and offline / Computer security / Art forgery

              Call for Participation Signature Verification Competition On- and Offline Skilled Forgeries http://sigcomp09.arsforensica.org 10th International Conference on Document Analysis and Recognition

              Add to Reading List

              Source URL: www.cvc.uab.es

              Language: English - Date: 2009-01-20 10:13:08
              UPDATE