Security

Results: 374843



#Item
131Security engineering / Computer security / Human behavior / Computer network security / Data security / Cryptography / National security / Asset / Threat / Countermeasure / Paranoia / Security

EECS 388 Intro to Computer Security September 6, 2016 Homework 1: Rational Paranoia

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:22
132Artificial neural networks / Computational neuroscience / Applied mathematics / Cybernetics / Neuroscience / Convolutional neural network / Long short-term memory / Recurrent neural network / Artificial intelligence

Poster: Summarized Network Behavior Prediction Shih-Chieh Su∗ Qualcomm Inc. San Diego, CA, 92121 Email: ∗

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-26 01:29:24
133Computing / Software engineering / Computer programming / Programming languages / High-level programming languages / Concurrent programming languages / Java platform / Java / Call stack / Stack / Java Class Library / Go

Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation Philipp Holzinger∗ , Ben Hermann† , Johannes Lerch† , Eric Bodden‡ and Mira Mezini† ∗ Fraunhofer SIT, Email: philipp.holzinger@sit

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:15
134Cryptocurrencies / Computing / Bitcoin / Internet / Free software / Alternative currencies / Blockchains / Internet security / BGP hijacking / Mining pool / Ghash.io / Denial-of-service attack

Hijacking Bitcoin: Routing Attacks on Cryptocurrencies https://btc-hijack.ethz.ch Maria Apostolaki Aviv Zohar

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:18
135Terms of service / Software / Computing / Technology / Social networking services / Microblogging / Real-time web / Text messaging / Twitter / Privacy / Internet privacy / Medical privacy

Poster - Using Twitter to Identify Privacy Information Esha Sharma1 and Jessica Staddon 2 Abstract— We are building the first comprehensive database

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-11 01:15:34
136Intellectual property law / Copyright law / Data / Copyright law of the United States / Copyright / Derivative work / Institute of Electrical and Electronics Engineers / Law / Author / Information / Copyright Act of Ghana / Authorship and ownership in copyright law in Canada

IEEE COPYRIGHT LICENSE FORM FOR LIMITED USE WITH IEEE COMPUTER SOCIETY’S EXPERIMENTAL “DELAYED-OPEN ACCESS” MODEL TITLE OF WORK (hereinafter, "the Work"): AUTHOR(S): IEEE PUBLICATION TITLE: 2017 IEEE Symposium on S

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-03-16 07:17:53
137Cryptography / Public-key cryptography / Homeomorphisms / Homomorphic encryption / Proxy re-encryption / Malleability / Message authentication code / Paillier cryptosystem / RSA / Digital signature

This is the full version of a paper which appears in Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April, Revised Selected Papers, Springer, LNCS. Homomorphic

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2017-02-03 04:27:06
138Computer programming / Software engineering / Mathematical logic / Formal methods / Predicate logic / Opaque predicate / Computability theory / Predicate / Satisfiability modulo theories / Stack / Disassembler / FO

Backward-Bounded DSE: Targeting Infeasibility Questions on Obfuscated Codes? Sébastien Bardin Robin David

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:56:28
139Computing / Computer security / Internet security / Information Age / Information and communications technology / HackerOne / Computer viruses / Bug bounty program / Hacker culture / Security hacker / Hacker / Katie Moussouris

ZOMATO’S HACKER-FOCUSED APPROACH TURNS THE TABLES ON SECURITY VULNERABILITIES Connecting eaters with restaurants is Zomato’s main business, so they took a hospitable approach to hackers, driving engagement and qualit

Add to Reading List

Source URL: www.hackerone.com

Language: English - Date: 2018-08-21 12:07:31
140Computing / Computer architecture / System software / Recall / Android / Pattern / Short-term memory / Student's t-test

SysPal: System-guided Pattern Locks for Android Geumhwan Cho1 , Jun Ho Huh2 , Junsung Cho1 , Seongyeol Oh1 , Youngbae Song1 , Hyoungshick Kim1 1 Department of Computer Science and Engineering, Sungkyunkwan University, So

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:02:19
UPDATE