Security

Results: 374843



#Item
121Machine learning / Artificial neural networks / Artificial intelligence / Learning / Computational neuroscience / Cybernetics / Statistical classification / Support vector machine / Autoencoder / Tor / Deep learning / Training /  test /  and validation sets

Poster: Experimental Evaluation of Website Fingerprinting using Deep Learning Payap Sirinam Mohsen Imani

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 06:14:58
122Law / Terms of service / Privacy law / Government / Information privacy / Privacy / Human rights / Medical privacy / Internet privacy / Office of the Australian Information Commissioner / Personally identifiable information / Personal Information Protection and Electronic Documents Act

NPPA PRIVACY POLICY NPP Australia Limited (NPPA) is committed to protecting and maintaining the privacy, accuracy and security of an individual’s personal information. This Privacy Policy describes how NPPA manages the

Add to Reading List

Source URL: www.nppa.com.au

Language: English - Date: 2018-02-26 22:05:21
123Data management / Computing / Data / Relational database management systems / Database theory / NoSQL / Structured storage / Database / NewSQL / Relational database / ODB / Conjunctive query

SoK: Cryptographically Protected Database Search Benjamin Fuller∗ , Mayank Varia† , Arkady Yerukhimovich‡ , Emily Shen‡ , Ariel Hamlin‡ , Vijay Gadepally‡ , Richard Shay‡ , John Darby Mitchell‡ , and Robe

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:55
124Cryptocurrencies / Blockchains / Computing / Concurrent computing / Alternative currencies / Data management / Bitcoin / Decentralization / Shard / Bitcoin Unlimited / Ethereum / Unspent transaction output

Poster: Low-latency blockchain consensus Cristina Basescu Lefteris Kokoris-Kogias Bryan Ford

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 19:45:56
125Cryptocurrencies / Alternative currencies / Economy / Money / Bitcoin / Blockchains / Computing / Decentralization / Ethereum / Digital currency / Proof-of-stake / Draft:Nihilo Blockchain Introduction

Sentinel Protocol Security Intelligence Platform for Blockchain Abstract The rapid development of computer technology in the 21st century has led to the manifestation of sophisticated and intelligent threats that

Add to Reading List

Source URL: s3-ap-southeast-1.amazonaws.com

Language: English - Date: 2018-10-12 03:26:38
126Computer architecture / System software / Operating system kernels / Linux kernel / Monolithic kernels / Kernel / Loadable kernel module / Protection ring / Operating system / Mach / Rootkit / Mandatory access control

Poster: (SF)2 I - Structure Field Software Fault Isolation Spyridoula Gravani, Zhuojia Shen, John Criswell Department of Computer Science, University of Rochester Email: {sgravani, zshen10, criswell}@cs.rochester.edu Ab

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 06:12:20
127Japanese martial arts / Martial arts / Canonical / Launchpad / Karate kata / Kata / Sports

* The speed of containers, the security of VMs katacontainers.io 2018 Launchpad Goals

Add to Reading List

Source URL: katacontainers.io

Language: English - Date: 2018-05-10 15:50:19
128Software / Computing / Web browsers / Computer network security / Mozilla / Social engineering / Portable software / Phishing / Firefox / Microsoft SmartScreen / Mozilla Corporation / Google Chrome

Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness Devdatta Akhawe, University of California, Berkeley; Adrienne Porter Felt, Google, Inc. This paper is included in the Proceedings

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2013-09-28 11:40:42
129Cryptography / Post-quantum cryptography / Coding theory / McEliece cryptosystem / Linear code / Generator matrix / Ciphertext / Index of cryptography articles / Niederreiter cryptosystem

Security concept: Lock on digital screen

Add to Reading List

Source URL: nis-summer-school.enisa.europa.eu

Language: English - Date: 2018-10-01 09:10:11
130Formal methods / Class / Class invariant / Invariant / Emmy Noether / Mathematics / Science and technology in Germany

IVD : Automatic Learning and Enforcement of Authorization Rules in Online Social Networks Paul Marinescu† , Chad Parry† , Marjori Pomarole† , Yuan Tian‡ , Patrick Tague‡ , Ioannis Papagiannis† † Facebook.

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:46
UPDATE