Skype security

Results: 118



#Item
1Superiorland Library Cooperative January 2014 Prepared by Jean Montgomery Skype – (also would be used for any video interaction software – facetime, Google Hangouts (video chat), VOIP). Things for the library to cons

Superiorland Library Cooperative January 2014 Prepared by Jean Montgomery Skype – (also would be used for any video interaction software – facetime, Google Hangouts (video chat), VOIP). Things for the library to cons

Add to Reading List

Source URL: joomla.uproc.lib.mi.us

Language: English - Date: 2014-01-03 13:33:26
2Two Methods for Detecting Malware Maciej Korczyński, Gilles Berger-Sabbatel, and Andrzej Duda Grenoble Institute of Technology, CNRS Grenoble Informatics Laboratory UMR, rue de la Passerelle, BPSaint

Two Methods for Detecting Malware Maciej Korczyński, Gilles Berger-Sabbatel, and Andrzej Duda Grenoble Institute of Technology, CNRS Grenoble Informatics Laboratory UMR, rue de la Passerelle, BPSaint

Add to Reading List

Source URL: mkorczynski.com

Language: English - Date: 2015-02-15 17:10:50
3Hacks vs. spooks  FREELANCE Jul/Aug 2016

Hacks vs. spooks FREELANCE Jul/Aug 2016

Add to Reading List

Source URL: media.gn.apc.org

Language: English - Date: 2016-06-09 13:18:06
4EEMA online May 2015 Issue 8 EEMA news eID: The business case for the banking and finance community 5 June 2015, Department for Business, Innovation and Skills, London

EEMA online May 2015 Issue 8 EEMA news eID: The business case for the banking and finance community 5 June 2015, Department for Business, Innovation and Skills, London

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:12
5Setting Up Your Computer:  Skype for Business

Setting Up Your Computer: Skype for Business

Add to Reading List

Source URL: www.kn-eat.org

Language: English - Date: 2016-05-10 09:54:13
6CALEA	
  II:	
  Risks	
  of	
  Wiretap	
  Modifications	
  to	
  Endpoints	
   Ben	
  Adida	
   Collin	
  Anderson	
   Annie	
  I.	
  Anton	
  (Georgia	
  Institute	
  of	
  Technology)	
   Matt	
  Bl

CALEA  II:  Risks  of  Wiretap  Modifications  to  Endpoints   Ben  Adida   Collin  Anderson   Annie  I.  Anton  (Georgia  Institute  of  Technology)   Matt  Bl

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-05-22 16:19:18
7Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services Tongxin Li1 , Xiaoyong Zhou2,4 , Luyi Xing2 , Yeonjoon Lee2 , Muhammad Naveed3 , XiaoFeng Wang2 and Xinhui Han1 1

Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services Tongxin Li1 , Xiaoyong Zhou2,4 , Luyi Xing2 , Yeonjoon Lee2 , Muhammad Naveed3 , XiaoFeng Wang2 and Xinhui Han1 1

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2015-11-16 12:11:54
8Early Security Classification of Skype Users via Machine Learning ∗ Anna Leontjeva

Early Security Classification of Skype Users via Machine Learning ∗ Anna Leontjeva

Add to Reading List

Source URL: users.soe.ucsc.edu

Language: English - Date: 2013-08-29 21:14:52
    9Delegating Network Security with More Information Jad Naous Ryan Stutsman  Stanford University

    Delegating Network Security with More Information Jad Naous Ryan Stutsman Stanford University

    Add to Reading List

    Source URL: conferences.sigcomm.org

    Language: English - Date: 2009-07-22 15:07:11
    10The Terror Bytes of Power  MERRY XMAS AND A HAPPY NEW YEAR FROM

    The Terror Bytes of Power MERRY XMAS AND A HAPPY NEW YEAR FROM

    Add to Reading List

    Source URL: amberhawk.typepad.com

    Language: English - Date: 2013-12-12 06:38:10