Johnny Miller

Results: 43



#Item
1

Johnny 2: A User Test of Key Continuity Management with S/MIME and Outlook Express Simson L. Garfinkel Robert C. Miller

Add to Reading List

Source URL: cups.cs.cmu.edu

- Date: 2005-05-30 16:31:14
    2First Baptist Church / Calvary Baptist Church / Baptists / Johnny Hunt / Christianity / Southern Baptist Convention / Protestantism

    Pastor/Staff & Family Celebrations Birthdays Wedding Anniversaries 01– Andie Piercy, YPK, West View 03– Anmity Bruton, PS, Stanford 05– Linda Miller, PS, Robbs Chapel

    Add to Reading List

    Source URL: mychurchwebsite.s3.amazonaws.com

    Language: English - Date: 2015-01-20 01:27:43
    3Bing Crosby / Jack Nicklaus / Sam Snead / Ben Hogan / Johnny Miller / Billy Casper / Tony Lema / Johnny Pott / Gene Littler / Golf / Pebble Beach Golf Links / AT&T Pebble Beach National Pro-Am

    1930s & 1940s "May the competition be keen, the scores low, and the gallery a genial one." 1947 Souvenir Program The first National Pro-Amateur Golf Championship sponsored by Bing Crosby contested on the Monterey Peninsu

    Add to Reading List

    Source URL: www.attpbgolf.com

    Language: English - Date: 2012-08-21 09:44:02
    4Sunshine Tour / Ernie Els / Lee Westwood / Johnny Miller / Tournament of Hope / Golf / Professional golf tours / Nedbank Golf Challenge

    Sun International Media Release 27 November 2013 NEW ERA, BUT SAME WINNING RECIPE FOR NEDBANK GOLF CHALLENGE The format change for the 2013 Nedbank Golf Challenge marks one of the most significant changes in

    Add to Reading List

    Source URL: www.suninternational.com

    Language: English - Date: 2014-05-02 08:12:42
    5Cyberwarfare / Data security / Intrusion detection system / Anomaly detection / Vulnerability / AAFID / Intrusion prevention system / Computer network security / Security / Computer security

    Noname manuscript No. (will be inserted by the editor) A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System Guy Helmer, Johnny Wong, Mark Slagell, Vasant Honavar, Les Miller, Robyn Lut

    Add to Reading List

    Source URL: www.cs.iastate.edu

    Language: English - Date: 2002-09-10 02:20:42
    6Data mining / Anomaly detection / Intrusion detection system / AAFID / Feature selection / Feature / Data Analysis Techniques for Fraud Detection / Statistics / Computer security / Data security

    The Journal of Systems and Software–175 www.elsevier.com/locate/jss Automated discovery of concise predictive rules for intrusion detection Guy Helmer, Johnny S.K. Wong *, Vasant Honavar, Les Miller

    Add to Reading List

    Source URL: www.cs.iastate.edu

    Language: English - Date: 2005-02-05 20:56:16
    7Jeff Sluman / Pebble Beach Golf Links / PGA Championship / Bobby Clampett / Tom Watson / First Tee Open / Phil Mickelson / Johnny Miller / Golf / Professional golf tours / U.S. Open

    Microsoft Word[removed]NVFTO Recap.doc

    Add to Reading List

    Source URL: www.thefirstteeopen.com

    Language: English - Date: 2012-09-26 12:20:17
    8AAFID / System software / Intrusion detection system / Software / Software agent / Mobile agent / Intelligent agent / Agent-based model / Open Source Tripwire / Artificial intelligence / Computer security / Computing

    The Journal of Systems and Software–122 www.elsevier.com/locate/jss Lightweight agents for intrusion detection q Guy Helmer, Johnny S.K. Wong *, Vasant Honavar, Les Miller, Yanxin Wang Department of Compu

    Add to Reading List

    Source URL: www.cs.iastate.edu

    Language: English - Date: 2004-02-19 15:54:40
    9Internet / S/MIME / Outlook Express / MIME / Secure messaging / Hotmail / Public-key cryptography / Man-in-the-middle attack / IBM Lotus Notes / Email / Computing / Computer-mediated communication

    Johnny 2: A User Test of Key Continuity Management with S/MIME and Outlook Express Simson L. Garfinkel Robert C. Miller

    Add to Reading List

    Source URL: cups.cs.cmu.edu

    Language: English - Date: 2005-05-30 16:31:14
    10Health / Healthcare / Law enforcement / Geriatrics / Federal Bureau of Investigation / Integrated Automated Fingerprint Identification System / Automated fingerprint identification / Licensure / Health care provider / Biometrics / Fingerprints / Medicine

    HUMAN SERVICES AND HEALTH CARE Fingerprint-Based Criminal Background Checks for Health Profession Licensure By Johnny Xu and Debra Miller The FBI has been using fingerprints to link perpetrators and crimes since at leas

    Add to Reading List

    Source URL: knowledgecenter.csg.org

    Language: English - Date: 2015-01-05 12:06:55
    UPDATE