Security engineering

Results: 11317



#Item
111  Securing Augmented Reality Output Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner Paul G. Allen School of Computer Science & Engineering University of Washington

1 Securing Augmented Reality Output Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner Paul G. Allen School of Computer Science & Engineering University of Washington

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:40
12Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks Sunghwan Kim, Seunghyun Yoon, and Hyuk Lim School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technol

Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks Sunghwan Kim, Seunghyun Yoon, and Hyuk Lim School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technol

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 15:46:40
13Poster: IoTcube: An Automated Analysis Platform for Finding Security Vulnerabilities Seulbae Kim, Seunghoon Woo, Heejo Lee, Hakjoo Oh Department of Computer Science and Engineering Korea University Seoul, Korea

Poster: IoTcube: An Automated Analysis Platform for Finding Security Vulnerabilities Seulbae Kim, Seunghoon Woo, Heejo Lee, Hakjoo Oh Department of Computer Science and Engineering Korea University Seoul, Korea

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-21 15:07:31
14Practical Template-Algebraic Side Channel Attacks with Extremely Low Data Complexity Yossef Oren, Ofir Weisse and Avishai Wool Cryptography and Network Security Lab School of Electrical Engineering Tel-Aviv University, R

Practical Template-Algebraic Side Channel Attacks with Extremely Low Data Complexity Yossef Oren, Ofir Weisse and Avishai Wool Cryptography and Network Security Lab School of Electrical Engineering Tel-Aviv University, R

Add to Reading List

Source URL: www.ofirweisse.com

Language: English - Date: 2018-10-17 09:19:20
15UNESCO-JASTIP Joint Symposium on Intra-Regional Water Security and Disaster Management Marjorie C. Turiano, Eric C. Cruz Institute of Civil Engineering University of the Philippines Diliman

UNESCO-JASTIP Joint Symposium on Intra-Regional Water Security and Disaster Management Marjorie C. Turiano, Eric C. Cruz Institute of Civil Engineering University of the Philippines Diliman

Add to Reading List

Source URL: jastip.org

Language: English - Date: 2018-03-01 03:27:30
    16Virginia Tech Department of Computer Science Postdoctoral researcher Seek one or two postdoctoral researchers who are interested in the use of system engineering and data analytics to ensure system and software security.

    Virginia Tech Department of Computer Science Postdoctoral researcher Seek one or two postdoctoral researchers who are interested in the use of system engineering and data analytics to ensure system and software security.

    Add to Reading List

    Source URL: people.cs.vt.edu

    Language: English - Date: 2017-06-29 15:14:44
      17Scalable Anonymous Communication with Provable Security Prateek Mittal, Nikita Borisov∗ Dept. of Electrical and Computer Engineering, U. of Illinois at Urbana-Champaign,  Carmela Troncoso, Alfredo Rial†

      Scalable Anonymous Communication with Provable Security Prateek Mittal, Nikita Borisov∗ Dept. of Electrical and Computer Engineering, U. of Illinois at Urbana-Champaign, Carmela Troncoso, Alfredo Rial†

      Add to Reading List

      Source URL: carmelatroncoso.com

      Language: English - Date: 2015-11-19 22:20:42
        18Jens Knoop, Uwe Zdun (Hrsg.): Software Engineering 2016, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, BonnModel-based Security Verification for Evolving Systems Jan Jürjens 1,2, Sven Wenzel

        Jens Knoop, Uwe Zdun (Hrsg.): Software Engineering 2016, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, BonnModel-based Security Verification for Evolving Systems Jan Jürjens 1,2, Sven Wenzel

        Add to Reading List

        Source URL: subs.emis.de

        Language: English - Date: 2016-02-25 13:12:58
          1924th International Working Conference, REFSQ 2018, Utrecht, The Netherlands, March 19-22, 2018 Security Requirements Elicitation from Engineering Governance, Risk Management and Compliance Lect. Dr. Ana-Maria Ghiran

          24th International Working Conference, REFSQ 2018, Utrecht, The Netherlands, March 19-22, 2018 Security Requirements Elicitation from Engineering Governance, Risk Management and Compliance Lect. Dr. Ana-Maria Ghiran

          Add to Reading List

          Source URL: refsq.org

          Language: English - Date: 2018-03-26 15:20:28
            20THE INSTITUTION OF ENGINEERING AND TECHNOLOGY CONFERENCE ON CRIME AND SECURITY TRACKS:

            THE INSTITUTION OF ENGINEERING AND TECHNOLOGY CONFERENCE ON CRIME AND SECURITY TRACKS:

            Add to Reading List

            Source URL: www.bmva.org

            Language: English - Date: 2006-05-19 08:44:00