Security analysis

Results: 6956



#Item
581

Some Comments on U.S. Holdings of Emerging Market Equities: A Security-Level Analysis Vincent Reinhart Director, Division of Monetary Affairs Board of Governors of the Federal Reserve

Add to Reading List

Source URL: web.mit.edu

- Date: 2005-08-31 15:41:13
    582

    A Security Analysis of the Combex DarpaBrowser Architecture David Wagner Dean Tribble March 4, 2002 1 Introduction We describe the results of a limited-time evaluation of the security of the Combex DarpaBrowser, built on

    Add to Reading List

    Source URL: combex.com

    - Date: 2005-08-18 16:59:11
      583

      Fuel for Thought: The Importance of Thorium to China by Cindy Hurst February 2015 Institute for the Analysis of Global Security (IAGS)

      Add to Reading List

      Source URL: www.iags.org

      - Date: 2015-02-23 17:31:11
        584

        The Institute for Foreign Policy Analysis, Inc. (IFPA), now in its thirty-second year, develops innovative strategies for new security challenges. IFPA conducts studies, workshops, and conferences on national security a

        Add to Reading List

        Source URL: www.ifpa.org

        - Date: 2010-10-21 11:14:54
          585

          User Intention-Based Traffic Dependence Analysis for Anomaly Detection

          Add to Reading List

          Source URL: www.ieee-security.org

          - Date: 2012-06-05 18:19:30
            586

            A Security Analysis of the Combex DarpaBrowser Architecture David Wagner Dean Tribble March 4, 2002

            Add to Reading List

            Source URL: combex.com

            - Date: 2005-08-18 16:59:23
              587

              Poster: System Anomaly Detection with Program Analysis and Machine Learning Assistance Kui Xu, Danfeng (Daphne) Yao, Barbara Ryder Department of Computer Science Virginia Tech Blacksburg, VA, 24060

              Add to Reading List

              Source URL: www.ieee-security.org

              - Date: 2013-05-17 10:01:45
                588

                2011 IEEE Symposium on Security and Privacy Automated Analysis of Security-Critical JavaScript APIs Ankur Taly Stanford University

                Add to Reading List

                Source URL: ieee-security.org

                - Date: 2011-04-10 18:07:02
                  589

                  Fast and Effective Endpoint Security for Business 2012 Comparative Analysis AugustDocument:

                  Add to Reading List

                  Source URL: passmark.com

                  - Date: 2012-08-21 20:54:12
                    590

                    Analysis on the Security of an Identity Based Proxy Re-encryption Xu an Wang and Xiaoyuan Yang Key Laboratory of Information and Network Security Engneering College of Chinese Armed Police Force, P. R. China E-mail:wangx

                    Add to Reading List

                    Source URL: grouper.ieee.org

                    - Date: 2009-06-26 15:24:13
                      UPDATE