Fabian

Results: 1148



#Item
871Privacy-Preserving Global Customization (Extended Abstract) Robert M. Arlein Ben Jai Markus Jakobsson Fabian Monrose Michael K. Reiter Information Sciences Research Center Bell Labs, Lucent Technologies Murray Hill, NJ,

Privacy-Preserving Global Customization (Extended Abstract) Robert M. Arlein Ben Jai Markus Jakobsson Fabian Monrose Michael K. Reiter Information Sciences Research Center Bell Labs, Lucent Technologies Murray Hill, NJ,

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:34
872Evaluating the Security of Handwriting Biometrics Lucas Ballard Daniel Lopresti  Fabian Monrose

Evaluating the Security of Handwriting Biometrics Lucas Ballard Daniel Lopresti Fabian Monrose

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:47
873iSpy: Automatic Reconstruction of Typed Input from Compromising Reflections Rahul Raguram, Andrew M. White, Dibenyendu Goswami, Fabian Monrose and Jan-Michael Frahm  Department of Computer Science, University of North Ca

iSpy: Automatic Reconstruction of Typed Input from Compromising Reflections Rahul Raguram, Andrew M. White, Dibenyendu Goswami, Fabian Monrose and Jan-Michael Frahm Department of Computer Science, University of North Ca

Add to Reading List

Source URL: www.cs.unc.edu

Language: English - Date: 2011-08-30 21:32:09
874Fast and Evasive Attacks: Highlighting the challenges ahead Moheeb Abu Rajab  Fabian Monrose

Fast and Evasive Attacks: Highlighting the challenges ahead Moheeb Abu Rajab Fabian Monrose

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:33
875Distillation Codes and DOS Resistant Multicast Moderation Prepared for CS 624 – Fabian Monrose Johns Hopkins University Kevin Snow & Ryan Gardner

Distillation Codes and DOS Resistant Multicast Moderation Prepared for CS 624 – Fabian Monrose Johns Hopkins University Kevin Snow & Ryan Gardner

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:20
876Trail of Bytes: Efficient Support for Forensic Analysis Srinivas Krishnan Kevin Snow  Fabian Monrose

Trail of Bytes: Efficient Support for Forensic Analysis Srinivas Krishnan Kevin Snow Fabian Monrose

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2011-04-18 21:55:17
877Worm Evolution Tracking via Timing Analysis Moheeb Abu Rajab Fabian Monrose Andreas Terzis Computer Science Department Johns Hopkins University {moheeb,fabian,terzis}@cs.jhu.edu

Worm Evolution Tracking via Timing Analysis Moheeb Abu Rajab Fabian Monrose Andreas Terzis Computer Science Department Johns Hopkins University {moheeb,fabian,terzis}@cs.jhu.edu

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:37
878Hello Sisters in Law Enforcement My name is Fabian Brown. I am running for Region 10 Coordinator and would be honored to represent the Members of Region 10 of the IAWP. I have been a member of the IAWP since 2003, when S

Hello Sisters in Law Enforcement My name is Fabian Brown. I am running for Region 10 Coordinator and would be honored to represent the Members of Region 10 of the IAWP. I have been a member of the IAWP since 2003, when S

Add to Reading List

Source URL: iawp.wildapricot.org

Language: English - Date: 2012-10-23 02:14:03
879THE IMPACT OF DOUBLE TAXATION TREATIES ON FOREIGN DIRECT INVESTMENT: EVIDENCE FROM LARGE DYADIC PANEL DATA FABIAN BARTHEL, MATTHIAS BUSSE and ERIC NEUMAYER∗ To increase inward foreign direct investment (FDI), policy ma

THE IMPACT OF DOUBLE TAXATION TREATIES ON FOREIGN DIRECT INVESTMENT: EVIDENCE FROM LARGE DYADIC PANEL DATA FABIAN BARTHEL, MATTHIAS BUSSE and ERIC NEUMAYER∗ To increase inward foreign direct investment (FDI), policy ma

Add to Reading List

Source URL: personal.lse.ac.uk

Language: English - Date: 2010-03-16 05:58:11
880Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks Techniques and Empirical Analyses Kevin Z. Snow  Fabian Monrose

Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks Techniques and Empirical Analyses Kevin Z. Snow Fabian Monrose

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2012-08-20 18:04:07