Ic

Results: 14218



#Item
1Theoretical computer science / Process calculi / -calculus / Process calculus

EXPRESSMatching Systems for Concurrent Calculi Bjørn Haagensen1 Aalborg University Denmark

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2009-08-14 07:09:04
2Computing / Internet protocols / Network architecture / Data transmission / Internet Standards / OSI model / Internet Protocol / Internet protocol suite / Internet layer / Communication protocol / Transport layer / Internet Control Message Protocol

RFCRequirements for Internet Hosts - Communication Layers

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2016-02-01 01:50:48
3Computing / Network architecture / Data transmission / Transmission Control Protocol / Flow control / Network protocols / Acknowledgement / Internet protocol suite / SYN flood

starting point TCP/IP State Transition Diagram (RFC793) CLOSED

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2016-02-01 01:50:48
4World Wide Web / Spamming / Marketing / Cyberspace / Email spam / Anti-spam techniques / URL shortening / Spam / Affiliate marketing / Email / Honeypot / Blacklist

Click Trajectories: End-to-End Analysis of the Spam Value Chain

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2015-02-12 13:32:16
5

This paper appears at the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDIDetecting and Defending Against Third-Party Tracking on the Web Franziska Roesner, Tadayoshi Kohno, and David We

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2016-03-07 03:28:10
    6Computer network security / Cyberwarfare / Computing / Security engineering / Honeypot / Computer security / Virtual machine / VMware / Internet privacy / Honeyd / Client honeypot

    Imperial College London Department of Electrical and Electronic Engineering MEng Individual Project Project Title:

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2016-01-21 09:17:57
    7

    Language-based Defenses against Untrusted Browser Origins Karthikeyan Bhargavan INRIA Paris-Rocquencourt Antoine Delignat-Lavaud INRIA Paris-Rocquencourt

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2018-02-20 10:22:48
      8Botnets / Cybercrime / Computing / Cyberwarfare / Torpig / Srizbi botnet / Festi / Fast flux / Domain generation algorithm / Bot herder / The Spamhaus Project / Conficker

      Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of California

      Add to Reading List

      Source URL: www.doc.ic.ac.uk

      Language: English - Date: 2015-02-12 10:29:36
      9Computing / Web standards / Semantic Web / Technical communication / T0 / Data integration / -calculus / Web Ontology Language / Database

      Dynamic Web Data: a Process Algebraic Approach Sergio Maffeis Department of Computing, Imperial College London Ph.D. Thesis, 2005. Thesis supervisor: Philippa Gardner

      Add to Reading List

      Source URL: www.doc.ic.ac.uk

      Language: English - Date: 2009-08-14 07:09:04
      10Computer security / Security engineering / Prevention / Crime prevention / Cryptography / Information governance / National security / Data quality / Information science / Middleware / Mandatory access control / Database

      SAFEWEB: A Middleware for Securing Ruby-based Web Applications Petr Hosek1 , Matteo Migliavacca1 , Ioannis Papagiannis1 , David M. Eyers2 , David Evans3 , Brian Shand4 , Jean Bacon3 , and Peter Pietzuch1 1

      Add to Reading List

      Source URL: srg.doc.ic.ac.uk

      Language: English - Date: 2011-12-01 05:00:04
      UPDATE