Computer surveillance

Results: 1478



#Item
61Piercing the HawkEye: Nigerian Cybercriminals Use a Simple Keylogger to Prey on SMBs Worldwide Ryan Flores and Lord Remorin Trend Micro Forward-Looking Threat Research Team with Mary Yambao and Don Ladores

Piercing the HawkEye: Nigerian Cybercriminals Use a Simple Keylogger to Prey on SMBs Worldwide Ryan Flores and Lord Remorin Trend Micro Forward-Looking Threat Research Team with Mary Yambao and Don Ladores

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2015-06-19 05:45:49
62

PDF Document

Add to Reading List

Source URL: www.gvdigital.com

Language: English - Date: 2014-07-04 04:15:17
632013 IEEE Intelligent Vehicles Symposium (IV) June 23-26, 2013, Gold Coast, Australia Design and implementation of a high performance pedestrian detection Antonio Prioletti1 , Paolo Grisleri2 , Mohan M. Trivedi3 and Albe

2013 IEEE Intelligent Vehicles Symposium (IV) June 23-26, 2013, Gold Coast, Australia Design and implementation of a high performance pedestrian detection Antonio Prioletti1 , Paolo Grisleri2 , Mohan M. Trivedi3 and Albe

Add to Reading List

Source URL: cvrr.ucsd.edu

Language: English - Date: 2013-07-08 00:37:28
64How to Manage ePermitting Security

How to Manage ePermitting Security

Add to Reading List

Source URL: apps.dep.wv.gov

Language: English - Date: 2014-04-22 11:10:39
65MILACAS-XR  POSSIBILITIES OF SAFETY. MADE EASY. MILACAS-XR TCAS II Processor. Change 7.1 For New Installations

MILACAS-XR POSSIBILITIES OF SAFETY. MADE EASY. MILACAS-XR TCAS II Processor. Change 7.1 For New Installations

Add to Reading List

Source URL: aerospace.honeywell.com

Language: English - Date: 2016-02-22 04:38:32
66WinterEagleEyes Project Boston College Editor: Kelly Robinson, MBA 2008

WinterEagleEyes Project Boston College Editor: Kelly Robinson, MBA 2008

Add to Reading List

Source URL: cameramouse.org

Language: English - Date: 2013-10-22 13:20:53
67Auton Robot:173–188 DOIs10514Optimal surveillance coverage for teams of micro aerial vehicles in GPS-denied environments using onboard vision Lefteris Doitsidis · Stephan Weiss · Alessa

Auton Robot:173–188 DOIs10514Optimal surveillance coverage for teams of micro aerial vehicles in GPS-denied environments using onboard vision Lefteris Doitsidis · Stephan Weiss · Alessa

Add to Reading List

Source URL: rpg.ifi.uzh.ch

Language: English - Date: 2013-11-17 14:31:28
68MEMORANDUM To: From: Date: Re:

MEMORANDUM To: From: Date: Re:

Add to Reading List

Source URL: www.aclu.org

Language: English - Date: 2015-04-10 18:25:21
69Statement of Condemnation of U.S. Mass-Surveillance Programs, and a Reminder of Our Ethical Responsibilities as Computer Scientists We have all been hearing about the NSA’s mass-surveillance programs, which go by names

Statement of Condemnation of U.S. Mass-Surveillance Programs, and a Reminder of Our Ethical Responsibilities as Computer Scientists We have all been hearing about the NSA’s mass-surveillance programs, which go by names

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2013-09-13 11:08:48
70Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance Jeffrey Knockel, Jedidiah R. Crandall, and Jared Saia University of New Mexico Dept. of Computer Science {jeffk, crandal

Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance Jeffrey Knockel, Jedidiah R. Crandall, and Jared Saia University of New Mexico Dept. of Computer Science {jeffk, crandal

Add to Reading List

Source URL: cs.unm.edu

Language: English - Date: 2011-08-01 19:43:41