Information school

Results: 25631



#Item
1Curriculum / Didactics

Notice of Intent to Provide Home Instruction DO NOT SUBMIT THIS FORM TO THE VIRGINIA DEPARTMENT OF EDUCATION. PLEASE FORWARD THIS COMPLETED FORM TO YOUR LOCAL SCHOOL DIVISION. Contact information for Virginia’s schoo

Add to Reading List

Source URL: www.doe.virginia.gov

Language: English - Date: 2018-07-10 15:42:11
2Cryptography / Obfuscation / Computer security / Password / Security / Cyberwarfare / Salt / Identity management / Password policy / Password fatigue

Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 08:13:56
3Security / Security breaches / Prevention / Ransomware / Cybercrime / Malware / Locky / Computer security

Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-24 15:44:20
4Computing / Information and communications technology / Data transmission / Decentralization / Local area networks / Computer networking / PerfSONAR / Network architecture / File sharing / Computer network / Network topology / Distributed computing

2013 IEEE 10th International Conference on Services Computing Design and Implementation of a Unified Network Information Service Ahmed El-Hassany∗ , Ezra Kissel∗ , Dan Gunter† , Martin Swany∗ , School of Inform

Add to Reading List

Source URL: people.ee.ethz.ch

Language: English - Date: 2017-02-01 15:47:49
5Mathematical analysis / Mathematics / Experiment / Information theory / Statistical theory / Measure theory / Random variable / Statistical randomness / Sigma-algebra / Probability distribution / Joint probability distribution / Probability space

Probabilistic Point-to-Point Information Leakage Tom Chothia∗ , Yusuke Kawamoto∗ , Chris Novakovic∗ and David Parker∗ ∗ School of Computer Science University of Birmingham, Birmingham, UK Abstract—The output

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
6Software / Computing / Digital media / Social media / Social networking services / Universal Windows Platform apps / Terms of service / Photo sharing / Twitter / Internet privacy / Facebook / Privacy concerns with social networking services

Is it Really About Me? Message Content in Social Awareness Streams Mor Naaman, Jeffrey Boase, Chih-Hui Lai Rutgers University, School of Communication and Information 4 Huntington St., New Brunswick, NJ 08901, USA {mor,

Add to Reading List

Source URL: individual.utoronto.ca

Language: English - Date: 2017-09-21 13:37:58
7Computer network security / Computing / Cyberwarfare / Multi-agent systems / Spamming / Cybercrime / Botnets / Intrusion detection system / Server / Cluster analysis / Internet bot / Computer security

Poster: Detecting Command and Control Servers of Botnet With Randomized Traffic Di Wu1,2, Binxing Fang3, Fangjiao Zhang1,2 1 (Institute of Information Engineering, Chinese Academy of Sciences) 2 (School of Cyber Security

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-11 13:01:38
8Information theory / Cryptography / Information / Electrical engineering / Information flow / Information leakage / Leak / Entropy / Weka / Memory leak / Mutual information / Biometric passport

A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
9Information theory / Statistical theory / Mathematics / Mathematical analysis / Entropy / Mutual information / Expected value / Confidence interval / Information flow / Binomial distribution / Conditional entropy / Quantities of information

LeakWatch: Estimating Information Leakage from Java Programs Tom Chothia1 , Yusuke Kawamoto2? , and Chris Novakovic1 1 School of Computer Science, University of Birmingham, UK

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
10Scheduling / Economy / Business / Human behavior / Automated planning and scheduling / Operations research / Planning / Schedule / Motion planning / Windows Task Scheduler / Automated guided vehicle / Robot

Task Scheduling and Trajectory Generation of Multiple Intelligent Vehicles Jennifer David Intelligent Systems Lab School of Information Technology Halmstad University

Add to Reading List

Source URL: icaps16.icaps-conference.org

Language: English - Date: 2016-06-09 08:09:24
UPDATE