Security analysis

Results: 6956



#Item
351Cyberwarfare / Internet / Denial-of-service attacks / Computing / Internet security / Cyberspace / Internet Relay Chat / Denial-of-service attack / Incapsula / Bitcoin / Mt. Gox / Cloudflare

Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem Marie Vasek, Micah Thornton, and Tyler Moore Computer Science and Engineering Department Southern Methodist University, Dallas, TX Email: {mvasek,m

Add to Reading List

Source URL: fc14.ifca.ai

Language: English - Date: 2014-02-18 12:20:22
352

IR1006 Foreign Policy Analysis and International Security (Vlcek) Tue, Wed, Thurs 10am Buchanan Lecture Theatre

Add to Reading List

Source URL: www.st-andrews.ac.uk

Language: English - Date: 2016-04-16 07:01:45
    353Data mining / Machine learning / Computational linguistics / Natural language processing / Anomaly detection / Data security / Link analysis / Outlier / Inference / Question answering / Supervised learning / Knowledge base

    Autonomously Reviewing and Validating the Knowledge Base of a Never-Ending Learning System Saulo D. S. Pedro Ana Paula Appel

    Add to Reading List

    Source URL: www2013.wwwconference.org

    Language: English - Date: 2014-07-21 08:46:54
    354

    Computer Security Course. Song Dawn Vulnerability Analysis (II): Symbolic

    Add to Reading List

    Source URL: inst.eecs.berkeley.edu

    Language: English - Date: 2015-02-10 03:33:18
      355

      Understanding and Improving App Installation Security Mechanisms through Empirical Analysis of Android David Barrera Jeremy Clark Paul C. van Oorschot

      Add to Reading List

      Source URL: users.encs.concordia.ca

      Language: English - Date: 2013-08-05 10:55:21
        356Computing / Cyberwarfare / Botnets / Computer network security / Multi-agent systems / Spamming / Concurrent computing / Domain generation algorithm / Malware / Sality / Denial-of-service attack / Computer virus

        AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis Zhaoyan Xu Antonio Nappa

        Add to Reading List

        Source URL: faculty.cs.tamu.edu

        Language: English - Date: 2014-09-29 02:03:52
        357Computing / Smartphones / Computer hardware / Software / Android / Secure Digital / Factory reset / Nexus One / HTC Desire / MultiMediaCard / HTC One / Trim

        Security Analysis of Android Factory Resets Laurent Simon University of Cambridge Ross Anderson

        Add to Reading List

        Source URL: ieee-security.org

        Language: English - Date: 2015-05-20 23:58:44
        358Software engineering / Computing / Computer programming / Concurrent programming languages / Dependence analysis / Static program analysis / Information flow / Program slicing / Scope / ALGOL 68 / Variable / XC

        A Security Domain Model to Assess Software for Exploitable Covert Channels Alan B. Shaffer Mikhail Auguston

        Add to Reading List

        Source URL: cisr.nps.edu

        Language: English - Date: 2008-08-18 13:40:59
        359

        Improved indifferentiability security analysis of chopMD Hash Function Donghoon Chang1? and Mridul Nandi2 1 Center for Information Security Technologies (CIST)

        Add to Reading List

        Source URL: www.isical.ac.in

        Language: English - Date: 2011-12-28 03:46:39
          360Cryptography / Computing / Dining cryptographers problem / Public-key cryptography / Crowds / Communications protocol / Anonymity / Tor

          Yale University Department of Computer Science Security Analysis of Accountable Anonymity in Dissent Ewa Syta Aaron Johnson Henry Corrigan-Gibbs

          Add to Reading List

          Source URL: ohmygodel.com

          Language: English - Date: 2014-08-17 14:48:08
          UPDATE