Security Patterns

Results: 182



#Item
1

Using Fraud Patterns for Fraud Risk Assessment of E-services Ahmed Seid Yesuf, Jetzabel Serna-Olvera and Kai Rannenberg Deutsche Telekom Chair of Mobile Business & Multilateral Security, Goethe University Frankfurt, Fran

Add to Reading List

Source URL: m-chair.de

Language: English - Date: 2017-07-31 16:44:18
    2

    Income distribution patterns from a complete social security database

    Add to Reading List

    Source URL: adatbank.transindex.ro

    - Date: 2015-12-02 05:14:54
      3

      LNCSQuantitative Evaluation of Systems with Security Patterns Using a Fuzzy Approach

      Add to Reading List

      Source URL: java.uom.gr

      - Date: 2015-11-06 10:19:42
        4

        Quantifying the Security of Graphical Passwords: The Case of Android Unlock Patterns Sebastian Uellenbeck, Markus Dürmuth, Christopher Wolf, and Thorsten Holz Horst Görtz Institute for IT-Security, Ruhr-University Boch

        Add to Reading List

        Source URL: ei.rub.de

        - Date: 2013-09-26 05:07:39
          5

          Patterns for Aligning Security and Usability [Poster] Simson L. Garfinkel Robert C. Miller

          Add to Reading List

          Source URL: cups.cs.cmu.edu

          - Date: 2005-06-21 09:58:18
            6Behavior / Human behavior / Security / Cybercrime / Crime prevention / Abuse / Bullying / Cyberbullying / Internet safety / ESET / Stranger danger / Child grooming

            How Safe are Australian Children in the Internet Age? Research and safety advice by ESET on online behaviour patterns and the security risks Australian children face

            Add to Reading List

            Source URL: www.welivesecurity.com

            Language: English - Date: 2015-12-16 12:44:23
            7Engineering / Computing / Security engineering / Robert C. Seacord / Secure coding / Computer programming / Vulnerability / Security Patterns / Software engineering / Cyberwarfare / Software development / Grady Booch

            Microsoft Word - review18.doc

            Add to Reading List

            Source URL: www.jot.fm

            Language: English - Date: 2007-08-10 10:58:07
            8Artificial intelligence / Feature detection / Machine learning / Face recognition / Local binary patterns / Ensemble learning / Learning / Local ternary patterns

            Learning Multi-scale Block Local Binary Patterns for Face Recognition Shengcai Liao, Xiangxin Zhu, Zhen Lei, Lun Zhang, and Stan Z. Li Center for Biometrics and Security Research & National Laboratory of Pattern Recognit

            Add to Reading List

            Source URL: www.cbsr.ia.ac.cn

            Language: English - Date: 2007-09-09 11:28:31
            9Computing / Computer security / Utility software / Identity management / Computer access control / SOA Security / WS-Security / Security Assertion Markup Language / WS-SecureConversation / WS-Policy / Security Patterns / XML Signature

            trust claims buffer overrun tokens

            Add to Reading List

            Source URL: www.soaschool.com

            Language: English - Date: 2013-01-08 15:17:40
            10Computational linguistics / Linguistics / Applied linguistics / Computer security / Cryptography / Word-sense disambiguation / Password / Security / Part-of-speech tagging / WordNet / Natural language processing / Dictionary attack

            On the Semantic Patterns of Passwords and their Security Impact Rafael Veras, Christopher Collins, and Julie Thorpe University of Ontario Institute of Technology Ontario, Canada {rafael.verasguimaraes, christopher.collin

            Add to Reading List

            Source URL: vialab.science.uoit.ca

            Language: English - Date: 2015-09-22 16:31:59
            UPDATE