Information networks

Results: 4265



#Item
1Cryptography / Obfuscation / Computer security / Password / Security / Cyberwarfare / Salt / Identity management / Password policy / Password fatigue

Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 08:13:56
2Meteorology / Equipment / Physical geography / Avionics / Air traffic control / Aircraft Meteorological Data Relay / Atmospheric thermodynamics / Measuring instruments / Secondary surveillance radar / Automatic dependent surveillance  broadcast / Radiosonde / OpenSky Network

2018 17th ACM/IEEE International Conference on Information Processing in Sensor Networks Monitoring Meteorological Parameters With Crowdsourced Air Traffic Control Data Roman Trüb

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2018-04-13 03:03:09
3Global Positioning System / Navigation / Technology / Wireless / Radio navigation / Geodesy / Aircraft instruments / GPS navigation device / Dilution of precision / Pseudorange / Assisted GPS / GPS signals

2018 17th ACM/IEEE International Conference on Information Processing in Sensor Networks Data Fusion for Hybrid and Autonomous Time-of-Flight Positioning Aymen Fakhreddine

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2018-04-13 03:04:41
4Computer networking / Computing / Cache / Information and communications technology / Data transmission / Internet architecture / Computer architecture / Content centric networking / Router / Named data networking

Privacy-aware Multipath Video Caching for Content-Centric Networks Wu, Q; Li, Z; TYSON, G; Uhlig, S; Ali Kafaar, M; Xie, G For additional information about this publication click this link. http://qmro.qmul.ac.uk/xmlui/h

Add to Reading List

Source URL: www.eecs.qmul.ac.uk

Language: English - Date: 2016-11-21 12:55:33
5Software / Computing / Social networking services / Digital media / Social media / Twitter / Reputation system / Internet privacy / Klout / Instagram / Facebook like button

Detecting and Mitigating the Effect of Manipulated Reputation on Online Social Networks Anupama Aggarwal « supervised by Dr. Ponnurangam Kumaraguru » Indraprastha Institute of Information Technology, Delhi New Delhi, I

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 00:34:37
6Electrical engineering / Electronics / Electromagnetism / Digital signal processing / Global Positioning System / Multilateration / Jitter / Software-defined radio / Modulation / Analog-to-digital converter / Radio receiver / Radar

2018 17th ACM/IEEE International Conference on Information Processing in Sensor Networks Nanosecond-precision Time-of-Arrival Estimation for Aircraft Signals with low-cost SDR Receivers Roberto Calvo-Palomino

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2018-04-13 03:04:44
7

Locality in Networks Jukka Suomela Helsinki Institute for Information Technology HIIT Department of Computer Science, University of Helsinki Foundations of Network Science Workshop Riga, 7 July 2013

Add to Reading List

Source URL: users.ics.aalto.fi

Language: English - Date: 2013-12-09 16:38:32
    8

    TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 1, NO. 8, AUGUSTTiming Attacks on Access Privacy in Information Centric Networks and Countermeasures

    Add to Reading List

    Source URL: www.cs.ucf.edu

    Language: English - Date: 2017-08-24 12:04:23
      9

      OPTIMAL SUPERIMPOSED PILOT SELECTION FOR OFDM CHANNEL ESTIMATION Angiras R. Varma, Chandra R. N. Athaudage ARC Special Research Center for Ultra-Broadband Information Networks University of Melbourne, Australia

      Add to Reading List

      Source URL: netlab.caltech.edu

      Language: English - Date: 2006-09-25 21:05:48
        10

        492 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 3, SEPTEMBER 2009 Channel-Based Detection of Sybil Attacks in Wireless Networks

        Add to Reading List

        Source URL: www.winlab.rutgers.edu

        Language: English - Date: 2010-10-13 17:15:15
          UPDATE