Network analysis

Results: 5019



#Item
991Software testing / Security / Hacking / Vulnerability / Attack / Password / Security risk / Social engineering / RSA / Computer network security / Cyberwarfare / Computer security

TRESPASS: Plug-and-Play Attacker Profiles for Security Risk Analysis Wolter Pieters∗† , Dina Hadˇziosmanovi´c∗ , Aleksandr Lenin‡ , Lorena Montoya† , and Jan Willemson‡ ∗ Delft University of Technology,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-05-07 16:20:44
992Algebraic graph theory / Centrality / Network theory / Networks / Combinatorics / Theoretical computer science / Network analysis / Mathematics / Graph theory

helsley_zenou_feb_2011.dvi

Add to Reading List

Source URL: groups.haas.berkeley.edu

Language: English - Date: 2011-02-16 12:22:34
993Cryptographic protocols / Needham–Schroeder protocol / Dropbox / Program refinement / Vulnerability / VisIt / Lottery / Computer security / Software / Computing / Computer network security

2014 IEEE Security and Privacy Workshops Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis Christian W. Probst Technical University of Denmark

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2014-04-30 03:10:08
994Structural health monitoring / Accelerometer / Sensors / Wireless sensor network / Needs assessment / Sensor node / Oxygen sensor / Sensor web / Structural analysis / Technology / Structural engineering / Engineering

Selected facility Acceleration sensors Position tags Strain sensors

Add to Reading List

Source URL: www.reconass.eu

Language: English - Date: 2015-04-28 05:42:46
995Knowledge / Research / Interpersonal relationships / Anthropology / Homophily / Innovation / Heterophily / Social network / Level of analysis / Statistics / Sociology / Science

Exploring the influence of others: Modelling Social connections in contemporary Britain Understanding Society Research ConferenceJuly 2013 University of Essex Vernon Gayle, Paul S. Lambert, Dave Griffiths & Mark T

Add to Reading List

Source URL: www.camsis.stir.ac.uk

Language: English - Date: 2013-07-25 05:42:45
996Protein-protein interaction assays / Molecular biology / Gene expression / STRING / Kernel principal component analysis / Transcription factor / Two-hybrid screening / Protein–protein interaction prediction / Structural genomics / Biology / Systems biology / Bioinformatics

Vol. 1 noPages 1–8 BIOINFORMATICS Protein Network Inference from Multiple Genomic

Add to Reading List

Source URL: www.bioreg.kyushu-u.ac.jp

Language: English - Date: 2012-03-14 12:45:12
997Network theory / Networks / Cybernetics / Resampling / Machine learning / Social network / Social network analysis software / Exponential random graph models / Science / Information / Statistics

Measurement and methodology for mining mobile, cloud-based, social systems Jennifer Neville Departments of Computer Science and Statistics Purdue University

Add to Reading List

Source URL: dmlab.cs.umn.edu

Language: English - Date: 2012-02-23 22:37:04
998Combinatorics / Knowledge representation / Scene graph / Graph / Force-based algorithms / Static single assignment form / Tree / Cytoscape / Social network analysis software / Graph theory / Mathematics / Graph drawing

Online-Configuration of Software Visualizations with Vizz3D Thomas Panas R¨udiger Lincke

Add to Reading List

Source URL: arisa.se

Language: English - Date: 2013-01-05 09:42:26
999Computing / Domain Name System Security Extensions / DNS spoofing / Name server / Google Public DNS / Man-in-the-middle attack / PowerDNS / Anycast / CNAME record / Internet / Domain name system / Network architecture

2014 IEEE Security and Privacy Workshops Towards Forensic Analysis of Attacks with DNSSEC Haya Shulman and Michael Waidner Fachbereich Informatik Technische Universit¨at Darmstadt

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2014-04-30 03:11:51
1000Ethics / Australian Transaction Reports and Analysis Centre / Privacy / Financial Intelligence / Egmont Group of Financial Intelligence Units / Money laundering / Tax Justice Network / Bank secrecy / Tax avoidance / Business / Financial regulation / Finance

Financial Secrecy Index Australia Narrative Report on Australia Australia, not traditionally regarded as a secrecy jurisdiction,

Add to Reading List

Source URL: financialsecrecyindex.com

Language: English - Date: 2013-11-14 04:00:01
UPDATE