Security

Results: 374843



#Item
61Computer architecture / Computing / System software / Software bugs / Embedded operating systems / Electrical engineering / Stack buffer overflow / FreeRTOS / Protection ring / Buffer overflow protection / Internet of things / Memory protection

Poster: EPOXY—Enabling Robust Protection for Bare-metal Systems Abraham A. Clements∗ , Naif Saleh Almakhdhub† , Khaled S. Saab‡ , Prashast Srivastava† , Jinkyu Koo† , Saurabh Bagchi† , Mathias Payer† ∗

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 19:44:12
62Terms of service / Identity management / Law / Privacy / Internet privacy / Attitude / Social psychology / Medical privacy / Psychology / Behavior

Poster: Why Privacy is All But Forgotten An Empirical Study of Privacy & Sharing Attitude Kovila P.L. Coopamootoo and Thomas Groß I. I NTRODUCTION Privacy and sharing are believed to share a dynamic and

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 16:46:26
63Security engineering / LinkedIn / Recruitment / Social media / Computer security / Security / Cyberspace

Business Services (en) IT-Security Vendors / System Integrators German-speaking Content Creation Marketing Services - Infopoint Security combines Marketing and PR duties. Get more visbility in the German-speaking DACH-ma

Add to Reading List

Source URL: www.infopoint-security.de

Language: English - Date: 2018-04-17 01:50:55
64Laboratories / Medical diagnosis / Medical laboratory / Nuclear history of the United States / Presidency of Jimmy Carter / Radiation Control for Health and Safety Act / Draft:Anti-Corruption and Public Integrity Act

§ 263 TITLE 42—THE PUBLIC HEALTH AND WELFARE (iv) provides for comprehensive and effective Federal oversight of BSAT security; and

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2018-04-26 06:22:01
65

2015 IEEE Symposium on Security and Privacy Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs Eli Ben-Sasson§ , Alessandro Chiesa∗ , Matthew Green† , Eran Tromer¶ , Madars Virza‡ ∗ ETH

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:13
    66Computing / Information and communications technology / Technology / Networking hardware / Wireless networking / Computer network security / Server appliance / Internet of things / Router / Mirai / Computer network / Computer security

    Paper Title (use style: paper title)

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-12 21:00:14
    67Computer security / Computing / Computer network security / Security engineering / Information and communications technology / Crime prevention / Cryptography / National security / Virtual private network / SCADA / FBI Criminal Justice Information Services Division / Computer network

    A Security Analysis of Police Computer Systems Benjamin VanderSloot∗ Stuart Wheaton∗ J. Alex Halderman

    Add to Reading List

    Source URL: benvds.com

    Language: English - Date: 2018-09-18 11:06:16
    68Coordinated Annual Review on Defence / Military of the European Union / Permanent Structured Cooperation / Common Security and Defence Policy / European Medical Command / World / Enhanced cooperation / European External Action Service / European Defence Agency / European Union Military Staff / European Union / Europe

    Permanent Structured Cooperation - PESCO Deepening Defence Cooperation among EU Member States More security for the EU and its citizens In light of a changing security

    Add to Reading List

    Source URL: eeas.europa.eu

    Language: English - Date: 2018-03-09 12:36:49
    69Cryptography / Radio electronics / Block ciphers / KeeLoq / Rolling code / Data Encryption Standard / ICE

    Cryptanalysis of KeeLoq with COPACOBANA Martin Novotný1,2, Timo Kasper1 Horst Görtz Institute for IT-Security Ruhr University Bochum 1

    Add to Reading List

    Source URL: www.hyperelliptic.org

    Language: English - Date: 2009-09-22 19:00:54
    70Machine learning / Artificial intelligence / Learning / Cognition / Training /  test /  and validation sets / CIFAR-10 / Artificial neural network / Support vector machine / Deep learning / Overfitting / Geographic information system / Neural architecture search

    Membership Inference Attacks Against Machine Learning Models Reza Shokri Cornell Tech

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:58:56
    UPDATE