Vector Security

Results: 220



#Item
11Computing / Internet / Network architecture / Routing protocols / Internet Standards / Internet protocols / Computer networking / Border Gateway Protocol / Routing / Router / Control plane / Path vector protocol

IMPACT OF BGP SECURITY DEPLOYMENT ON ROUTE VALIDATION ALEX ȘTEFĂNESCU 2 MarBGP SECURITY ISSUES

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2011-03-03 09:07:54
12Statistics / Statistical classification / Data / Anomaly detection / Data mining / Data security / Machine learning / Support vector machine / Outlier / Decision boundary / Artificial neural network

Enhancing One-class Support Vector Machines for Unsupervised Anomaly Detection Mennatallah Amer1, Markus Goldstein2, Slim Abdennadher1 1 2

Add to Reading List

Source URL: www.outlier-analytics.org

Language: English - Date: 2013-08-13 15:59:38
13Statistical classification / Data / Information / Computing / Geographic data and information / Global Positioning System / Biometrics / Coding theory / Fuzzy extractor / Geotagging / Support vector machine / K-nearest neighbors algorithm

Robust Geotag Generation for Security Applications Di Qiu*, Sherman Lo, Dan Boneh and Per Enge Stanford University, Stanford, CA Why geo-security?

Add to Reading List

Source URL: scpnt.stanford.edu

Language: English - Date: 2009-10-23 18:24:49
14Actuarial science / Economy / Prevention / Risk / Security / Project management / Systems engineering / Risk management / Enterprise risk management / Finance / Insurance / Succession planning

FB Logos-Vector_OpenersBlueWtaglines.eps

Add to Reading List

Source URL: www.crystalco.com

Language: English - Date: 2015-05-14 10:30:03
15Cyberwarfare / Computational linguistics / Automatic identification and data capture / Computer accessibility / Speech recognition / Mel-frequency cepstrum / Computer security / Denial-of-service attack / Artificial neural network / CMU Sphinx / Vector / CAPTCHA

Hidden Voice Commands Nicholas Carlini∗ University of California, Berkeley Tavish Vaidya Georgetown University Clay Shields

Add to Reading List

Source URL: security.cs.georgetown.edu

Language: English - Date: 2016-06-29 23:07:54
16Linear algebra / Vectors / Vector calculus / Machine learning / Computational linguistics / Speech synthesis / Speaker recognition / High-level synthesis / Euclidean vector / Vector space / Computer security / Linear subspace

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. X, NO. X, MONTH 20XX 1 Joint Speaker Verification and Anti-Spoofing in the i-Vector Space

Add to Reading List

Source URL: www.cstr.inf.ed.ac.uk

Language: English - Date: 2015-09-29 11:06:25
17Generally Accepted Accounting Principles / Financial statements / Financial institutions / Vector Security / Insurance / Underwriting / Philadelphia Contributionship / Income statement / Deferral / Balance sheet

T he Philadelphia C ontributionship 263rd Annual Report 2015

Add to Reading List

Source URL: www.contributionship.com

Language: English - Date: 2016-03-18 13:24:26
18Routing protocols / Hashing / Error detection and correction / Routing algorithms / Distributed data storage / Hash chain / Routing / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Merkle tree / Cryptographic hash function / Distance-vector routing protocol

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University Adrian Perrig

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:12
19Cryptography / Block cipher modes of operation / Ciphertext stealing / Initialization vector / Ciphertext indistinguishability / Advantage / Semantic security / Encryption / Disk encryption theory / Probabilistic encryption

The Security of Ciphertext Stealing Phillip Rogaway1 , Mark Wooding2 , and Haibin Zhang1 1 Dept. of Computer Science, University of California, Davis, USA 2

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2012-05-16 03:26:41
20Domain name system / Verisign / Domain Name System Security Extensions / Top-level domain / Domain name / .net / Comparison of DNS server software / OpenDNS

VRSN_logo_vertical_CMYK_vector

Add to Reading List

Source URL: www.verisign.com

Language: English - Date: 2016-06-13 14:05:07
UPDATE