IEEE

Results: 22018



#Item
51Security / Security breaches / Prevention / Ransomware / Cybercrime / Malware / Locky / Computer security

Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-24 15:44:20
52Artificial neural networks / Applied mathematics / Cybernetics / Mathematics / Deep learning / CIFAR-10 / MNIST database / Rectifier / Softmax function / Feedforward neural network / Gradient descent / Activation function

Towards Evaluating the Robustness of Neural Networks Nicholas Carlini David Wagner University of California, Berkeley A BSTRACT

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:02:30
53Physics / Mechanics / Theory of relativity / Classical mechanics / Aircraft instruments / Technology / Surveying / Frames of reference / Visual odometry / Inertial frame of reference / Spacetime / Inertial navigation system

IEEE ROBOTICS AND AUTOMATION LETTERS. PREPRINT VERSION. ACCEPTED DECEMBER, Ultimate SLAM? Combining Events, Images, and IMU for Robust

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2018-01-22 21:35:52
54Computing / Computer programming / Computer architecture / Programming language implementation / Compilers / Debugging / Executable / Dynamic linker / Address space layout randomization / Magic number / Data segment / Data

NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64 Yaohui Chen∗ Ahmed M. Azab† ∗

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:59:04
55Computing / Software engineering / Computer programming / Memory management / Software bugs / Data types / Procedural programming languages / Programming languages / Garbage collection / Garbage / C dynamic memory allocation / Memory leak

From trash to treasure: timing-sensitive garbage collection Mathias V. Pedersen Aslan Askarov

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:11
56Computing / Information and communications technology / Data transmission / Decentralization / Local area networks / Computer networking / PerfSONAR / Network architecture / File sharing / Computer network / Network topology / Distributed computing

2013 IEEE 10th International Conference on Services Computing Design and Implementation of a Unified Network Information Service Ahmed El-Hassany∗ , Ezra Kissel∗ , Dan Gunter† , Martin Swany∗ , School of Inform

Add to Reading List

Source URL: people.ee.ethz.ch

Language: English - Date: 2017-02-01 15:47:49
57Concurrent computing / Parallel computing / Computing / Computer architecture / Cluster computing / Fault-tolerant computer systems / Computer cluster / Supercomputer / Scalability / Data-intensive computing / High-availability cluster / MOSIX

IEEE COMPUTER ARCHITECTURE LETTERS, VOL. 11, NO. 2, JULY-DECEMBERIncluding Variability in Large-Scale Cluster Power Models

Add to Reading List

Source URL: rivoire.cs.sonoma.edu

Language: English - Date: 2017-05-29 18:44:35
58Concurrent computing / Computer network security / Multi-agent systems / Spamming / Computing / Cybercrime / Distributed computing / Malware / Botnet / Peer-to-peer / Social peer-to-peer processes

Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of Sciences

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 09:17:38
59Graph theory / Mathematics / Computational complexity theory / Network theory / NP-complete problems / Graph coloring / Connectivity / Shortest path problem / Routing algorithms

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 64, NO. 8, AUGUSTReliability and Temporality Optimization for Multiple Coexisting WirelessHART Networks

Add to Reading List

Source URL: wirelesslab.sjtu.edu.cn

Language: English - Date: 2017-12-01 00:35:35
60Artificial intelligence / World Wide Web / Human-based computation / Technology / Computer vision / Computer access control / Anti-spam / CAPTCHA / Computer security / Internet bot / Turing test / Transaction authentication number

Poster: Adaptcha: An Adaptive CAPTCHA for Improved User Experience Brian M. Powell1 , Richa Singh1,2 , Mayank Vatsa1,2 and Afzel Noore1 1 West Virginia University, 2 IIIT-Delhi {brian.powell, afzel.noore}@mail.wvu.edu, {

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 09:05:50
UPDATE