Security engineering

Results: 11317



#Item
1

Is Interaction Necessary for Distributed Private Learning? Adam Smith∗ , Abhradeep Thakurta† , Jalaj Upadhyay∗ of Electrical Engineering and Computer Science, Pennsylvania State University, Email: {asmith, jalaj}@p

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:45
    2Computer security / Computing / Cyberwarfare / Computer network security / Security engineering / Crime prevention / Cryptography / National security / Threat model / Threat / STRIDE / Information security

    Threat modeling, incident command, & DDoS mitigation Maarten Van Horenbeeck Vp of Security Engineering, Fastly Dr. Jose Nazario

    Add to Reading List

    Source URL: www.fastly.com

    Language: English - Date: 2018-01-30 17:52:40
    3Computing / Cyberwarfare / Computer security / Cryptography / Cybercrime / Computer network security / Backdoor / Rootkits / Google Play / Android / Firebase / Password

    Poster: Design of Backdoor on Android Devices Junsung Cho, Geumhwan Cho, Sangwon Hyun and Hyoungshick Kim Department of Computer Science and Engineering, Sungkyunkwan University, Republic of Korea Email: {js.cho, geumhwa

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-13 08:11:56
    4Cryptography / Obfuscation / Computer security / Password / Security / Cyberwarfare / Salt / Identity management / Password policy / Password fatigue

    Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-13 08:13:56
    5Security / Security breaches / Prevention / Ransomware / Cybercrime / Malware / Locky / Computer security

    Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-24 15:44:20
    6Concurrent computing / Computer network security / Multi-agent systems / Spamming / Computing / Cybercrime / Distributed computing / Malware / Botnet / Peer-to-peer / Social peer-to-peer processes

    Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of Sciences

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-12 09:17:38
    7Computing / Computer architecture / System software / Recall / Android / Pattern / Short-term memory / Student's t-test

    SysPal: System-guided Pattern Locks for Android Geumhwan Cho1 , Jun Ho Huh2 , Junsung Cho1 , Seongyeol Oh1 , Youngbae Song1 , Hyoungshick Kim1 1 Department of Computer Science and Engineering, Sungkyunkwan University, So

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 16:02:19
    8Sponsor / Value-added tax / TED / Culture / Terminology / Human behavior

    DIMVA Dear Prospective Sponsor. Since 2004 and 2009 the annual international IT-Security conferences DIMVA (Detection of Intrusions and Malware & Vulnerability Assessment) and ESSOS (Engineering Secure Software and Syste

    Add to Reading List

    Source URL: itsec.cs.uni-bonn.de

    Language: English - Date: 2017-04-24 03:56:14
    9Computer network security / Computing / Cyberwarfare / Multi-agent systems / Spamming / Cybercrime / Botnets / Intrusion detection system / Server / Cluster analysis / Internet bot / Computer security

    Poster: Detecting Command and Control Servers of Botnet With Randomized Traffic Di Wu1,2, Binxing Fang3, Fangjiao Zhang1,2 1 (Institute of Information Engineering, Chinese Academy of Sciences) 2 (School of Cyber Security

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-11 13:01:38
    10Mathematical analysis / Special functions / Mathematics / Trigonometry / Angle / Dimensionless numbers / Ratios / Analytic functions / Trigonometric functions / Sine / Taylor series / Polynomial

    Poster: Secure Computations of Trigonometric and Inverse Trigonometric Functions Fattaneh Bayatbabolghani∗ , Marina Blanton† , Mehrdad Aliasgari‡ and Michael Goodrich§ ∗ Computer Science and Engineering, Univer

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-25 08:06:46
    UPDATE