<--- Back to Details
First PageDocument Content
Computer network security / Computing / Multi-agent systems / Cyberwarfare / Botnets / Spamming / Cybercrime / Serverless computing / Bot herder / Computer security / Internet bot
Date: 2017-05-12 13:30:48
Computer network security
Computing
Multi-agent systems
Cyberwarfare
Botnets
Spamming
Cybercrime
Serverless computing
Bot herder
Computer security
Internet bot

Paper Title (use style: paper title)

Add to Reading List

Source URL: www.ieee-security.org

Download Document from Source Website

File Size: 685,79 KB

Share Document on Facebook

Similar Documents

SERVERLESS COMPUTING DEVELOPER EMPOWERMENT REACHES NEW HEIGHTS w w w.iron.io

DocID: 1tLbU - View Document

Mid-Day Keynote | How Serverless Computing Changes Cloud, and Your Job David S. Linthicum © 2017 Cloud Technology Partners, Inc. 1

DocID: 1tDmb - View Document

Computing / File sharing / Peer-to-peer computing / Telecommunications engineering / Wireless networking / Concurrent computing / Technology / Peer-to-peer / Node / Network architecture / Wireless ad hoc network / Bootstrapping node

Serverless and Peer-to-peer distributed interfaces for musical control ∗ Andrés Cabrera

DocID: 1rq7Y - View Document

Computing / Software / Cloud computing / Web hosting / Cloud infrastructure / Cloud storage / Serverless computing / Web services / Docker / Google App Engine / Amazon Web Services / WaveMaker

Deliverable D2 - Know Your City App Technical Documentation. Expert contract number C391977 – Development of the Know Your City App to be demonstrated at the GEOSS Plenary meeting Luis Rodríguez Pupo, Carlos Granell

DocID: 1r9oU - View Document

Computing / Cloud computing / Cloud infrastructure / Cloud storage / Java enterprise platform / Heroku / Serverless computing / Apache JMeter / CloudStore / Proxy server / UK Government G-Cloud

CloudStore  -­‐  towards  scalability   benchmarking  in  Cloud  compu9ng   Richard  Sanders     ! Mariano  Cecowski    

DocID: 1r9kp - View Document