1![Curriculum Vitae Stefan Ratschan Office address: Institute of Computer Science Academy of Sciences of the Czech Republic Pod Vod´arenskou vˇeˇz´ı 2 Curriculum Vitae Stefan Ratschan Office address: Institute of Computer Science Academy of Sciences of the Czech Republic Pod Vod´arenskou vˇeˇz´ı 2](https://www.pdfsearch.io/img/8f8cbe36cbef3ab8bcb8e1ea340283ef.jpg) | Add to Reading ListSource URL: www2.cs.cas.czLanguage: English - Date: 2018-07-28 04:11:44
|
---|
2![THE NATIONAL ACADEMY OF TELEVISION ARTS AND SCIENCES ANNOUNCES WINNERS AT THE 39th ANNUAL NEWS & DOCUMENTARY EMMY® AWARDS Paula S. Apsell, Senior Executive Producer, PBS’ NOVA THE NATIONAL ACADEMY OF TELEVISION ARTS AND SCIENCES ANNOUNCES WINNERS AT THE 39th ANNUAL NEWS & DOCUMENTARY EMMY® AWARDS Paula S. Apsell, Senior Executive Producer, PBS’ NOVA](https://www.pdfsearch.io/img/28b65eb97c507f0de943eec95e6911be.jpg) | Add to Reading ListSource URL: cdn.emmyonline.orgLanguage: English - Date: 2018-10-02 14:59:40
|
---|
3![Poster: Identify and Track Web Attacker Based on Deceptive Technology and Browser Fingerprint Heyang Lv1 Binxing Fang2 Xiang Cui3,4 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China Poster: Identify and Track Web Attacker Based on Deceptive Technology and Browser Fingerprint Heyang Lv1 Binxing Fang2 Xiang Cui3,4 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China](https://www.pdfsearch.io/img/1b1b3c5cae948b386e887584cff3d568.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-05-12 06:46:30
|
---|
4![Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines](https://www.pdfsearch.io/img/4d1c6485a5856277d1804eab31357591.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-05-13 08:13:56
|
---|
5![Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of](https://www.pdfsearch.io/img/df17e177a17b2aa8d8825a1a899c6eda.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-05-24 15:44:20
|
---|
6![Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of Sciences Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of Sciences](https://www.pdfsearch.io/img/2ed153993ccae741936f493775b89fc6.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-05-12 09:17:38
|
---|
7![Moscow ML Language Overview Version 2.00 of June 2000 Sergei Romanenko, Russian Academy of Sciences, Moscow, Russia Claudio Russo, Cambridge University, Cambridge, United Kingdom Peter Sestoft, Royal Veterinary and Agric Moscow ML Language Overview Version 2.00 of June 2000 Sergei Romanenko, Russian Academy of Sciences, Moscow, Russia Claudio Russo, Cambridge University, Cambridge, United Kingdom Peter Sestoft, Royal Veterinary and Agric](https://www.pdfsearch.io/img/c0473113e601ef5f3aaa68f87b27e4d8.jpg) | Add to Reading ListSource URL: mosml.orgLanguage: English - Date: 2014-08-29 03:47:37
|
---|
8![Poster: Detecting Command and Control Servers of Botnet With Randomized Traffic Di Wu1,2, Binxing Fang3, Fangjiao Zhang1,2 1 (Institute of Information Engineering, Chinese Academy of Sciences) 2 (School of Cyber Security Poster: Detecting Command and Control Servers of Botnet With Randomized Traffic Di Wu1,2, Binxing Fang3, Fangjiao Zhang1,2 1 (Institute of Information Engineering, Chinese Academy of Sciences) 2 (School of Cyber Security](https://www.pdfsearch.io/img/f83cd4e4f300c855b33686363a363d8d.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-05-11 13:01:38
|
---|
9![ISSN: PUBLICATIONS FOR SALE by the Florida Academy of Sciences Complete sets. Broken sets. Individual numbers. Immediate delivery. A few numbers reprinted by photo-offset. All prices strictly net. Prices quote ISSN: PUBLICATIONS FOR SALE by the Florida Academy of Sciences Complete sets. Broken sets. Individual numbers. Immediate delivery. A few numbers reprinted by photo-offset. All prices strictly net. Prices quote](https://www.pdfsearch.io/img/9e6861b50f99760e66a709c53a24b664.jpg) | Add to Reading ListSource URL: fas.fit.eduLanguage: English - Date: 2018-07-19 15:00:12
|
---|
10![Social intelligence: how to integrate research? A mechanistic perspective Marcin Miłkowski Institute of Philosophy and Sociology, Polish Academy of Sciences, ul. Nowy Świat 72, Warsaw, Poland .p Social intelligence: how to integrate research? A mechanistic perspective Marcin Miłkowski Institute of Philosophy and Sociology, Polish Academy of Sciences, ul. Nowy Świat 72, Warsaw, Poland .p](https://www.pdfsearch.io/img/11709680e8579e7e85f79530c82731bd.jpg) | Add to Reading ListSource URL: ceur-ws.orgLanguage: English - Date: 2014-10-28 07:10:58
|
---|