Security engineering

Results: 11317



#Item
471Computer programming / Software engineering / Computing / Computer security / Control-flow integrity / Code reuse / Return-oriented programming / Subroutine / Control flow / Flow graph / Pointer

Fine-Grained Control-Flow Integrity through Binary Hardening Mathias Payer, Antonio Barresi, Thomas R. Gross ETH Zürich

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
472World Wide Web / Marketing / Computing / Internet marketing / Alphabet Inc. / Search engine optimization / Google / Cloud computing

TM Customer Spotlight Kintronics is an engineering and consulting company that sells IP security solutions custom designed to fit their customer needs. Kintronics

Add to Reading List

Source URL: www.contentmx.com

Language: English - Date: 2015-11-30 12:40:30
473Software quality / Source code / Ambient intelligence / Internet of things / Reliability engineering / Computer security / Quality assurance / Software engineering

Software Quality Days 2017 January 17th-20th 2017, Vienna, Austria Call for Papers Scientific Program https://2017.software-quality-days.com/vortragende/scientific-call-for-paper/

Add to Reading List

Source URL: 2017.software-quality-days.com

Language: English - Date: 2016-06-03 06:15:32
474Multiplexing / Concurrency / Diagrams / Petri net / T-carrier / Finite topological space / Relaxation / Futures and promises / Mathematics / Abstraction / Software engineering

Towards Timed Models for Cyber-Physical Security Protocols Max Kanovich∗ , Tajana Ban Kirigin† , Vivek Nigam‡ , Andre Scedrov§ and Carolyn Talcott¶ ∗ ∗

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2014-07-17 09:25:54
475

Science & Engineering Research Support soCiety Special Issue Call for Papers Special Issue on: Security in Surface

Add to Reading List

Source URL: sersc.org

Language: English - Date: 2013-05-15 23:48:38
    476Computing / Software engineering / Computer security / Web development / Internet privacy / Scripting languages / Hypertext Transfer Protocol / Computer network security / HTTP cookie / Cross-site scripting / Cross-site request forgery / Dynamic web page

    WWWTrack: Security, Privacy, Reliability, and Ethics Session: Defending Against Emerging Threats Exposing Private Information by Timing Web Applications

    Add to Reading List

    Source URL: www.abortz.net

    Language: English - Date: 2016-01-16 18:17:58
    477

    T. Charles Clancy, Ph.D. Curriculum Vitæ General Information Hume Center for National Security and Technology Bradley Department of Electrical and Computer Engineering

    Add to Reading List

    Source URL: wireless.vt.edu

    Language: English - Date: 2015-06-25 14:38:48
      478Cybercrime / Security / Misconduct / Crime / Social engineering / Spamming / Identity theft / Computer network security / Phishing / Computer security / Website defacement / Targeted threat

      JPCERT/CC Incident Handling Report[October 1, 2015 – December 31, 2015]

      Add to Reading List

      Source URL: www.jpcert.or.jp

      Language: English - Date: 2016-03-24 22:49:18
      479Safety / Security / Prevention / Building engineering / Civil engineering / Construction (Design and Management) Regulations / Fire marshal / Fire safety / Security guard / Construction / Elevator / Fire protection

      AUSTIN CONVENTION CENTER 500 E. Cesar Chavez Street Austin, TexasOperational Policy

      Add to Reading List

      Source URL: www.austinconventioncenter.com

      Language: English - Date: 2016-02-18 14:43:45
      480Computing / Cyberwarfare / Computer security / Computer network security / Cybercrime / Spamming / Social engineering / Botnet / Web threat / Malware / Vulnerability / Computer virus

      Fighting the ‘Good’ Internet War Dan Cvrˇcek† and George Danezis 1 University of Cambridge, UK & Brno University of Technology, CZ. 2

      Add to Reading List

      Source URL: www0.cs.ucl.ac.uk

      Language: English - Date: 2013-10-10 06:48:56
      UPDATE