Poster

Results: 19881



#Item
1Computer network security / Computing / Security engineering / Computer security / Cyberwarfare / Cybercrime / Spamming / Multi-agent systems / Botnet / Complex event processing / Zeek / Blacklist

POSTER: BotFlex: A Community-driven Tool for Botnet Detection Sheharbano Khattak Independent Researcher

Add to Reading List

Source URL: sheharbano.com

Language: English - Date: 2017-02-16 07:58:23
2Computer network security / Cyberwarfare / Economy / Finance / Spoofing attack / Global Positioning System / Automatic dependent surveillance  broadcast / Spoof / Computer security / OpenSky Network / Flightradar24

POSTER: Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System Kai Jansen Matthias Schäfer

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2017-06-18 03:58:02
3Cryptography / Transport Layer Security / Secure communication / E-commerce / Cryptographic protocols / Internet security / HTTPS / POODLE / Cipher suite / RC4 / Public key certificate / Certificate authority

Poster: Browser’s ”search form” issues and countermeasures Yuji Suga Internet Initiative Japan Inc., Iidabashi Grand Bloom, Fujimi, Chiyoda-ku, , Japan Abstract—From 2014, we are con

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-15 11:54:40
4Computing / Computer architecture / Android / System software / Online marketplaces / Google Play / Intent

Poster: Android Collusive Data Leaks with Flow-sensitive DIALDroid Dataset Amiangshu Bosu Fang Liu, Danfeng (Daphne) Yao, Gang Wang Department of Computer Science

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-05 07:38:02
5Computing / Internet / Statistical classification / Free software / Dark web / Secure communication / Tor / Relay / K-nearest neighbors algorithm / Outline of machine learning / Bandwidth / .tor

Poster: PredicTor: Predicting Fast Circuits For A Faster User Experience in Tor Armon Barton, Mohsen Imani, Matthew Wright, and Jiang Ming I. I NTRODUCTION Tor is a low-latency anonymity system designed for TCPbased appl

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-15 19:28:54
6Dark web / Computing / Internet / Secure communication / Cryptographic protocols / Information and communications technology / Fingerprinting algorithms / Tor / .onion / Internet privacy / Operation Onymous / Computer network

Poster: Fingerprinting Hidden Service Circuits from a Tor Middle Relay Marc Juarez Rob Jansen

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-06-21 13:36:21
7

logo-nhshackday-long-poster

Add to Reading List

Source URL: nhshackday.com

- Date: 2018-07-27 09:20:39
    8Bruno Kessler / Institute of technology

    Microsoft Word - www2016-poster-track-LATE-welcome.doc

    Add to Reading List

    Source URL: gdac.uqam.ca

    Language: English - Date: 2017-10-04 00:20:55
    9Cybercrime / Computing / Human behavior / Cyberspace / Social engineering / Cyberwarfare / Phishing / Spamming / Social networking service / Facebook / Computer security / Transaction authentication number

    Poster: Phishing on Facebook Sovantharith Seng Mahdi Nasrullah Al-Ameen Matthew Wright

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-14 07:46:24
    10Software engineering / Computer programming / Computing / Object-oriented programming languages / KeY / Symbolic execution / Thread / LLVM / Parallel computing / D / Concolic testing

    Poster: Dynamic Taint Analysis of Concurrent Program Based on Symbolic Execution Yu Hao∗ , Xiaodong Zhang∗ , Zijiang Yang† and Ting Liu∗ ,IEEEauthorrefmark2 ∗ Ministry of Education Key Lab for Intelligent Netw

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-30 18:44:12
    UPDATE