31![Poster: Summarized Network Behavior Prediction Shih-Chieh Su∗ Qualcomm Inc. San Diego, CA, 92121 Email: ∗ Poster: Summarized Network Behavior Prediction Shih-Chieh Su∗ Qualcomm Inc. San Diego, CA, 92121 Email: ∗](https://www.pdfsearch.io/img/582f44af018d542e4d74490c47e2a1cc.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-04-26 01:29:24
|
---|
32![Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation Philipp Holzinger∗ , Ben Hermann† , Johannes Lerch† , Eric Bodden‡ and Mira Mezini† ∗ Fraunhofer SIT, Email: philipp.holzinger@sit Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation Philipp Holzinger∗ , Ben Hermann† , Johannes Lerch† , Eric Bodden‡ and Mira Mezini† ∗ Fraunhofer SIT, Email: philipp.holzinger@sit](https://www.pdfsearch.io/img/57f3fbfe50d7bbc16c472524b3404bbf.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-04-03 15:58:15
|
---|
33![Georgios Fainekos School of Computing, Informatics and Decision Systems Engineering, Arizona State University. Office address: 660 W 6th St, STE, Tempe, AZweb: http://www.public.asu.edu/~gfaineko/, email: f Georgios Fainekos School of Computing, Informatics and Decision Systems Engineering, Arizona State University. Office address: 660 W 6th St, STE, Tempe, AZweb: http://www.public.asu.edu/~gfaineko/, email: f](https://www.pdfsearch.io/img/97363296fbf99cb2a7e5ee83530c0d3e.jpg) | Add to Reading ListSource URL: www.public.asu.eduLanguage: English - Date: 2018-02-09 03:36:24
|
---|
34![Human behavior / Violence / Sexual abuse / Behavior / Violence against women / Sexual violence / Rape in the United States / Violence against men / Domestic violence / Sexual Assault Awareness Month / Sexual assault Human behavior / Violence / Sexual abuse / Behavior / Violence against women / Sexual violence / Rape in the United States / Violence against men / Domestic violence / Sexual Assault Awareness Month / Sexual assault](/pdf-icon.png) | Add to Reading ListSource URL: safeathome.iowa.govLanguage: English - Date: 2018-02-17 07:18:03
|
---|
35![International Organization http://journals.cambridge.org/INO Additional services for International Organization: Email alerts: Click here International Organization http://journals.cambridge.org/INO Additional services for International Organization: Email alerts: Click here](https://www.pdfsearch.io/img/0fcc516bf13ceec69df515aa2b917936.jpg) | Add to Reading ListSource URL: www.saramitchell.orgLanguage: English - Date: 2015-03-06 17:41:49
|
---|
36![A Framework for Universally Composable Diffie-Hellman Key Exchange Ralf K¨usters and Daniel Rausch University of Stuttgart Stuttgart, Germany Email: {ralf.kuesters, daniel.rausch}@informatik.uni-stuttgart.de A Framework for Universally Composable Diffie-Hellman Key Exchange Ralf K¨usters and Daniel Rausch University of Stuttgart Stuttgart, Germany Email: {ralf.kuesters, daniel.rausch}@informatik.uni-stuttgart.de](https://www.pdfsearch.io/img/d2624491137ac81806451b8449cb4b01.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-04-03 15:55:11
|
---|
37![Ritwika Ghosh phone : (+email : Profile : I am a first year graduate student in Computer Science at the University of Illinois, Urbana-Champaign, interested in formal methods, and appl Ritwika Ghosh phone : (+email : Profile : I am a first year graduate student in Computer Science at the University of Illinois, Urbana-Champaign, interested in formal methods, and appl](https://www.pdfsearch.io/img/8bac925884c1d33787b74254db8819f9.jpg) | Add to Reading ListSource URL: web.engr.illinois.eduLanguage: English - Date: 2014-02-28 12:52:15
|
---|
38![Alcatraz: Data Exfiltration-Resilient Corporate Network Architecture Daniele E. Asoni ETH Z¨urich Email: Takayuki Sasaki Alcatraz: Data Exfiltration-Resilient Corporate Network Architecture Daniele E. Asoni ETH Z¨urich Email: Takayuki Sasaki](https://www.pdfsearch.io/img/55ea90b5312cda405e5552c12f6cf429.jpg) | Add to Reading ListSource URL: www.netsec.ethz.chLanguage: English |
---|
39![Organising Monkeys or How to Run a Hacking Club Andreea-Ina Radu, Sam L. Thomas School of Computer Science University of Birmingham Email: {A.I.Radu, S.L.Thomas}@cs.bham.ac.uk Abstract—We describe the organisation of t Organising Monkeys or How to Run a Hacking Club Andreea-Ina Radu, Sam L. Thomas School of Computer Science University of Birmingham Email: {A.I.Radu, S.L.Thomas}@cs.bham.ac.uk Abstract—We describe the organisation of t](https://www.pdfsearch.io/img/de54818d57ba49d3be0d04313a1ac569.jpg) | Add to Reading ListSource URL: afnom.netLanguage: English - Date: 2018-10-16 09:54:50
|
---|
40![Tensority: an ASIC-friendly Proof of Work Algorithm Based on Tensor Bytom Foundation Email: April 17, 2018 Abstract Tensority: an ASIC-friendly Proof of Work Algorithm Based on Tensor Bytom Foundation Email: April 17, 2018 Abstract](https://www.pdfsearch.io/img/c84304687875b975bbb85f1ce5fd6741.jpg) | Add to Reading ListSource URL: bytom.ioLanguage: English - Date: 2018-04-18 21:58:58
|
---|