<--- Back to Details
First PageDocument Content
Computing / Computer networking / Data management / Network architecture / Cloud storage / Data center / Distributed data storage / Software-defined networking / Cloud computing / Computer security / Application Defined Network
Date: 2014-03-19 22:40:33
Computing
Computer networking
Data management
Network architecture
Cloud storage
Data center
Distributed data storage
Software-defined networking
Cloud computing
Computer security
Application Defined Network

Research Statement for Theophilus Benson The average enterprise network operator is responsible for managing a network that secures $5 billion worth of intellectual property (McAfeeand whose poor performance can r

Add to Reading List

Source URL: users.cs.duke.edu

Download Document from Source Website

File Size: 40,20 KB

Share Document on Facebook

Similar Documents

Poster: Android Collusive Data Leaks with Flow-sensitive DIALDroid Dataset Amiangshu Bosu Fang Liu, Danfeng (Daphne) Yao, Gang Wang  Department of Computer Science

Poster: Android Collusive Data Leaks with Flow-sensitive DIALDroid Dataset Amiangshu Bosu Fang Liu, Danfeng (Daphne) Yao, Gang Wang Department of Computer Science

DocID: 1xW0O - View Document

EECS 388 Intro to Computer Security October 21, 2016 Homework 4: Denial of Service

EECS 388 Intro to Computer Security October 21, 2016 Homework 4: Denial of Service

DocID: 1xVVc - View Document

Is Interaction Necessary for Distributed Private Learning? Adam Smith∗ , Abhradeep Thakurta† , Jalaj Upadhyay∗ of Electrical Engineering and Computer Science, Pennsylvania State University, Email: {asmith, jalaj}@p

Is Interaction Necessary for Distributed Private Learning? Adam Smith∗ , Abhradeep Thakurta† , Jalaj Upadhyay∗ of Electrical Engineering and Computer Science, Pennsylvania State University, Email: {asmith, jalaj}@p

DocID: 1xVSf - View Document

EECS 388 Intro to Computer Security October 7, 2016 Homework 3: Authentication and Passwords

EECS 388 Intro to Computer Security October 7, 2016 Homework 3: Authentication and Passwords

DocID: 1xVMf - View Document

HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

DocID: 1xVHD - View Document