1![Poster: Android Collusive Data Leaks with Flow-sensitive DIALDroid Dataset Amiangshu Bosu Fang Liu, Danfeng (Daphne) Yao, Gang Wang Department of Computer Science Poster: Android Collusive Data Leaks with Flow-sensitive DIALDroid Dataset Amiangshu Bosu Fang Liu, Danfeng (Daphne) Yao, Gang Wang Department of Computer Science](https://www.pdfsearch.io/img/c4895d09a9e90f6d94f2801841c74150.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-05-05 07:38:02
|
---|
2![This is the full version of a paper which appears in Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April, Revised Selected Papers, Springer, LNCS. Homomorphic This is the full version of a paper which appears in Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April, Revised Selected Papers, Springer, LNCS. Homomorphic](https://www.pdfsearch.io/img/331d3307054bf930fbd84f3b1f001be2.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2017-02-03 04:27:06
|
---|
3![Use Privacy in Data-Driven Systems Theory and Experiments with Machine Learnt Programs Anupam Datta CMU Use Privacy in Data-Driven Systems Theory and Experiments with Machine Learnt Programs Anupam Datta CMU](https://www.pdfsearch.io/img/88ddb65e47b115f27a5c5a7cd6d6af32.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-04-15 05:23:56
|
---|
4![Poster: Multi-source data analysis for SQL injection detection Kevin Ross, Melody Moh, Teng-Sheng Moh Jason Yao Poster: Multi-source data analysis for SQL injection detection Kevin Ross, Melody Moh, Teng-Sheng Moh Jason Yao](https://www.pdfsearch.io/img/e9601d6b882eaa93d250ccd4275b66a1.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-05-13 00:41:20
|
---|
5![CoinCap.io, CoinCap Apps Online Privacy Notice Data protection and security are important to CoinCap ( CoinCap.io, CoinCap Apps Online Privacy Notice Data protection and security are important to CoinCap (](https://www.pdfsearch.io/img/3640de087aa618416a262dbe87e767bc.jpg) | Add to Reading ListSource URL: static.coincap.ioLanguage: English - Date: 2018-09-24 22:08:26
|
---|
6![Control-data plane intelligence trade-off in SDN Yash Sinha, Siddharth Bhatia Birla Institute of Technology and Science, Pilani, India Abstract— With the decoupling of network control and data Control-data plane intelligence trade-off in SDN Yash Sinha, Siddharth Bhatia Birla Institute of Technology and Science, Pilani, India Abstract— With the decoupling of network control and data](https://www.pdfsearch.io/img/b85b410e9e8b19ae00fbfb0c1d79a939.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-05-13 21:01:36
|
---|
7![Pyramid: Enhancing Selectivity in Big Data Protection with Count Featurization Mathias Lecuyer∗1 , Riley Spahn∗1 , Roxana Geambasu1 , Tzu-Kuo Huang†2 , and Siddhartha Sen3 1 Columbia University, 2 Uber Advanced Tec Pyramid: Enhancing Selectivity in Big Data Protection with Count Featurization Mathias Lecuyer∗1 , Riley Spahn∗1 , Roxana Geambasu1 , Tzu-Kuo Huang†2 , and Siddhartha Sen3 1 Columbia University, 2 Uber Advanced Tec](https://www.pdfsearch.io/img/ac53f2f8ddd918b2dc7692601cd76c2a.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-04-03 16:01:30
|
---|
8![Practical Template-Algebraic Side Channel Attacks with Extremely Low Data Complexity Yossef Oren, Ofir Weisse and Avishai Wool Cryptography and Network Security Lab School of Electrical Engineering Tel-Aviv University, R Practical Template-Algebraic Side Channel Attacks with Extremely Low Data Complexity Yossef Oren, Ofir Weisse and Avishai Wool Cryptography and Network Security Lab School of Electrical Engineering Tel-Aviv University, R](https://www.pdfsearch.io/img/b74c740213775c41b50ef0ecc432184c.jpg) | Add to Reading ListSource URL: www.ofirweisse.comLanguage: English - Date: 2018-10-17 09:19:20
|
---|
9![CoreFlow: Enriching Bro security events using network traffic monitoring data Ralph Koninga,b,∗, Nick Buragliob , Cees de Laata,b , Paola Grossoa a Universiteit b Energy van Amsterdam, Science Park 904, Amsterdam, The CoreFlow: Enriching Bro security events using network traffic monitoring data Ralph Koninga,b,∗, Nick Buragliob , Cees de Laata,b , Paola Grossoa a Universiteit b Energy van Amsterdam, Science Park 904, Amsterdam, The](https://www.pdfsearch.io/img/e188fcdd1ba85f977f4272e0548f0db4.jpg) | Add to Reading ListSource URL: delaat.netLanguage: English - Date: 2018-07-19 17:56:33
|
---|
10![National Aeronautics and Space Administration DATA & APPLICATIONS Agriculture and Food Security Overview National Aeronautics and Space Administration DATA & APPLICATIONS Agriculture and Food Security Overview](https://www.pdfsearch.io/img/639c091743fe5cb51f7733c69699d82e.jpg) | Add to Reading ListSource URL: ciesin.columbia.eduLanguage: English - Date: 2017-04-19 15:09:41
|
---|