Security

Results: 374843



#Item
91Finra Rule 5320 Disclosure Rule 5320 generally provides that a broker-dealer that accepts and holds an order in an equity security from its own customer or customer of another broker-dealer is prohibited from trading tha

Finra Rule 5320 Disclosure Rule 5320 generally provides that a broker-dealer that accepts and holds an order in an equity security from its own customer or customer of another broker-dealer is prohibited from trading tha

Add to Reading List

Source URL: www.traditionamericas.com

Language: English - Date: 2017-03-31 11:07:20
92BUILDING A REGULATED INVESTMENT PLATFORM AND SECURITY TOKEN EXCHANGE FOR START-UPS AND SMEs Q4 2018  Disclaimer

BUILDING A REGULATED INVESTMENT PLATFORM AND SECURITY TOKEN EXCHANGE FOR START-UPS AND SMEs Q4 2018 Disclaimer

Add to Reading List

Source URL: kambio.io

Language: English - Date: 2018-10-18 01:47:00
93Poster: Shell We Play A Game? CTF-as-a-service for Security Education Adam Doup´e and Giovanni Vigna Arizona State University and UC Santa Barbara ,

Poster: Shell We Play A Game? CTF-as-a-service for Security Education Adam Doup´e and Giovanni Vigna Arizona State University and UC Santa Barbara ,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 00:24:26
94EECS 388 Intro to Computer Security September 30, 2016 Project 2: Web Security

EECS 388 Intro to Computer Security September 30, 2016 Project 2: Web Security

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:22
95A full version of this paper is available at https://papernot.fr/files/extending-distillation.pdf  Poster: Extending Defensive Distillation Nicolas Papernot and Patrick McDaniel Pennsylvania State University {ngp5056,mcd

A full version of this paper is available at https://papernot.fr/files/extending-distillation.pdf Poster: Extending Defensive Distillation Nicolas Papernot and Patrick McDaniel Pennsylvania State University {ngp5056,mcd

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 02:41:14
96Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 08:13:56
97Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-24 15:44:20
98Context Generation from Formal Specifications for C Analysis Tools Michele Alberti1? and Julien Signoles2 TrustInSoft, Paris, France  CEA LIST, Software Reliability and Security Laborator

Context Generation from Formal Specifications for C Analysis Tools Michele Alberti1? and Julien Signoles2 TrustInSoft, Paris, France CEA LIST, Software Reliability and Security Laborator

Add to Reading List

Source URL: julien.signoles.free.fr

Language: English - Date: 2017-09-15 19:04:15
99EECS 388 Intro to Computer Security November 18, 2016 Project 5: Forensics

EECS 388 Intro to Computer Security November 18, 2016 Project 5: Forensics

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:22
100Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 and Jan Verschuren1 1  Netherlands National Communication Security Agency (NLNCSA)

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 and Jan Verschuren1 1 Netherlands National Communication Security Agency (NLNCSA)

Add to Reading List

Source URL: joostrijneveld.nl

Language: English - Date: 2018-09-03 08:56:26