1![Inference and Attack in Bayesian Networks Sjoerd T. Timmer a John-Jules Ch. Meyer a Silja Renooij a Inference and Attack in Bayesian Networks Sjoerd T. Timmer a John-Jules Ch. Meyer a Silja Renooij a](https://www.pdfsearch.io/img/fa1d3daf54858011450b383d33099054.jpg) | Add to Reading ListSource URL: www.ai.rug.nlLanguage: English - Date: 2013-10-07 10:58:19
|
---|
2![STIR-ing the Wireless Medium with Self-Tuned, Inference-Based, Real-Time Jamming Bruce DeBruhl, Yu Seung Kim, Zachary Weinberg, Patrick Tague Carnegie Mellon University Electrical and Computer Engineering {debruhl, yuseu STIR-ing the Wireless Medium with Self-Tuned, Inference-Based, Real-Time Jamming Bruce DeBruhl, Yu Seung Kim, Zachary Weinberg, Patrick Tague Carnegie Mellon University Electrical and Computer Engineering {debruhl, yuseu](https://www.pdfsearch.io/img/6026c9141042199bc4ebc3d1d617558b.jpg) | Add to Reading ListSource URL: research.owlfolio.orgLanguage: English - Date: 2016-04-20 11:44:16
|
---|
3![Monitoring Database Access Constraints with an RBAC Metamodel: a Feasibility Study Lars Hamann, Karsten Sohr, and Martin Gogolla University of Bremen, Computer Science Department DBremen, Germany {lhamann,sohr,gog Monitoring Database Access Constraints with an RBAC Metamodel: a Feasibility Study Lars Hamann, Karsten Sohr, and Martin Gogolla University of Bremen, Computer Science Department DBremen, Germany {lhamann,sohr,gog](https://www.pdfsearch.io/img/f16727cfbde2b0b09b34c6286699fb8b.jpg) | Add to Reading ListSource URL: www.db.informatik.uni-bremen.deLanguage: English - Date: 2014-12-06 08:06:31
|
---|
4![2015 IEEE CS Security and Privacy Workshops Quantifying Genomic Privacy via Inference Attack with High-Order SNV Correlations Sahel Shariati Samani∗ , Zhicong Huang† , Erman Ayday‡ , Mark Elliot∗ , Jacques Fella 2015 IEEE CS Security and Privacy Workshops Quantifying Genomic Privacy via Inference Attack with High-Order SNV Correlations Sahel Shariati Samani∗ , Zhicong Huang† , Erman Ayday‡ , Mark Elliot∗ , Jacques Fella](https://www.pdfsearch.io/img/8303189b812059cd9191b089b7412919.jpg) | Add to Reading ListSource URL: www.genopri.orgLanguage: English - Date: 2015-05-21 15:27:03
|
---|
5![Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security](https://www.pdfsearch.io/img/21bf37d3d790f14bf5f28715b1b9ba8d.jpg) | Add to Reading ListSource URL: ieee-security.orgLanguage: English - Date: 2012-05-22 01:34:48
|
---|
6![Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security](https://www.pdfsearch.io/img/be02c0d9666749ba222d698962129dbc.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2012-05-22 01:34:48
|
---|
7![A Game-Theoretic Framework for Analyzing Trust-Inference Protocols Ruggero Morselli∗ Jonathan Katz∗ A Game-Theoretic Framework for Analyzing Trust-Inference Protocols Ruggero Morselli∗ Jonathan Katz∗](https://www.pdfsearch.io/img/19dca54920c04ac4cab1b077415de24b.jpg) | Add to Reading ListSource URL: www.eecs.harvard.eduLanguage: English - Date: 2004-05-31 19:56:00
|
---|
8![World Wide Web / Web 2.0 / Keyhole Markup Language / Android software / Google Maps / Web mapping / Google / Cache / Inference attack / Software / Computing / Human–computer interaction World Wide Web / Web 2.0 / Keyhole Markup Language / Android software / Google Maps / Web mapping / Google / Cache / Inference attack / Software / Computing / Human–computer interaction](/pdf-icon.png) | Add to Reading ListSource URL: techxplore.comLanguage: English - Date: 2015-05-18 06:55:35
|
---|
9![Success through confidence: Evaluating the effectiveness of a side-channel attack. Adrian Thillard, Emmanuel Prouff, and Thomas Roche ANSSI, 51, Bd de la Tour-Maubourg, 75700 Paris 07 SP, France .f Success through confidence: Evaluating the effectiveness of a side-channel attack. Adrian Thillard, Emmanuel Prouff, and Thomas Roche ANSSI, 51, Bd de la Tour-Maubourg, 75700 Paris 07 SP, France .f](https://www.pdfsearch.io/img/4e3653c0fc90300d2c240bf787f2220f.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-05-04 07:23:23
|
---|
10![A Game-Theoretic Framework for Analyzing Trust-Inference Protocols Ruggero Morselli∗ Jonathan Katz∗ A Game-Theoretic Framework for Analyzing Trust-Inference Protocols Ruggero Morselli∗ Jonathan Katz∗](https://www.pdfsearch.io/img/1ce1751f641e3ff2e48d2b7e0311c47c.jpg) | Add to Reading ListSource URL: www.cs.umd.eduLanguage: English - Date: 2004-06-01 10:54:35
|
---|