<--- Back to Details
First PageDocument Content
University of Birmingham / Universities in the United Kingdom / Higher education / Academia / Education / Institute of Engineering / Association of Commonwealth Universities / Institute of Education / University of London
Date: 2015-05-05 02:02:21
University of Birmingham
Universities in the United Kingdom
Higher education
Academia
Education
Institute of Engineering
Association of Commonwealth Universities
Institute of Education
University of London

Add to Reading List

Source URL: www.ioe.ac.uk

Download Document from Source Website

File Size: 2,87 MB

Share Document on Facebook

Similar Documents

Constraint programming / Mathematics / Lattice theory / Mathematical optimization / Applied mathematics / Constraint satisfaction / Local consistency / Semilattice / Linear programming / Optimization problem / Constraint / Feasible region

in Knowledge Engineering Reviews, 2001 Synthesis of EÆcient Constraint Satisfaction Programs Stephen J. Westfold and Douglas R. Smith Kestrel Institute 3260 Hillview Avenue

DocID: 1xVgq - View Document

Systems science / Carnegie Mellon University / Systems engineering / Systems theory / Cyberwarfare / Software Engineering Institute / System of systems / Carnegie Mellon Silicon Valley / Software engineering / Pittsburgh / Science and technology in the United States

BOXES: Abstract Domain of Boxes Arie Gurfinkel and Sagar Chaki Software Engineering Institute Carnegie Mellon University January 28, 2011

DocID: 1xV1C - View Document

Cryptography / Obfuscation / Computer security / Password / Security / Cyberwarfare / Salt / Identity management / Password policy / Password fatigue

Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

DocID: 1xUTK - View Document

Security / Security breaches / Prevention / Ransomware / Cybercrime / Malware / Locky / Computer security

Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

DocID: 1xUT1 - View Document

Concurrent computing / Computer network security / Multi-agent systems / Spamming / Computing / Cybercrime / Distributed computing / Malware / Botnet / Peer-to-peer / Social peer-to-peer processes

Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of Sciences

DocID: 1xUGX - View Document