11![1 Securing Augmented Reality Output Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner Paul G. Allen School of Computer Science & Engineering University of Washington 1 Securing Augmented Reality Output Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner Paul G. Allen School of Computer Science & Engineering University of Washington](https://www.pdfsearch.io/img/7c874b473559a74e393dfdf1a79b3662.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-04-03 16:01:40
|
---|
12![Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks Sunghwan Kim, Seunghyun Yoon, and Hyuk Lim School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technol Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks Sunghwan Kim, Seunghyun Yoon, and Hyuk Lim School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technol](https://www.pdfsearch.io/img/c6a4b31cf2df42bfdd0e3be15c945364.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-05-14 15:46:40
|
---|
13![Poster: IoTcube: An Automated Analysis Platform for Finding Security Vulnerabilities Seulbae Kim, Seunghoon Woo, Heejo Lee, Hakjoo Oh Department of Computer Science and Engineering Korea University Seoul, Korea Poster: IoTcube: An Automated Analysis Platform for Finding Security Vulnerabilities Seulbae Kim, Seunghoon Woo, Heejo Lee, Hakjoo Oh Department of Computer Science and Engineering Korea University Seoul, Korea](https://www.pdfsearch.io/img/5435d8061f14b6450486204a8cd3b10c.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-05-21 15:07:31
|
---|
14![Practical Template-Algebraic Side Channel Attacks with Extremely Low Data Complexity Yossef Oren, Ofir Weisse and Avishai Wool Cryptography and Network Security Lab School of Electrical Engineering Tel-Aviv University, R Practical Template-Algebraic Side Channel Attacks with Extremely Low Data Complexity Yossef Oren, Ofir Weisse and Avishai Wool Cryptography and Network Security Lab School of Electrical Engineering Tel-Aviv University, R](https://www.pdfsearch.io/img/b74c740213775c41b50ef0ecc432184c.jpg) | Add to Reading ListSource URL: www.ofirweisse.comLanguage: English - Date: 2018-10-17 09:19:20
|
---|
15![UNESCO-JASTIP Joint Symposium on Intra-Regional Water Security and Disaster Management Marjorie C. Turiano, Eric C. Cruz Institute of Civil Engineering University of the Philippines Diliman UNESCO-JASTIP Joint Symposium on Intra-Regional Water Security and Disaster Management Marjorie C. Turiano, Eric C. Cruz Institute of Civil Engineering University of the Philippines Diliman](https://www.pdfsearch.io/img/f43b6c8746f3574036b6b726d1c3812c.jpg) | Add to Reading ListSource URL: jastip.orgLanguage: English - Date: 2018-03-01 03:27:30
|
---|
16![Virginia Tech Department of Computer Science Postdoctoral researcher Seek one or two postdoctoral researchers who are interested in the use of system engineering and data analytics to ensure system and software security. Virginia Tech Department of Computer Science Postdoctoral researcher Seek one or two postdoctoral researchers who are interested in the use of system engineering and data analytics to ensure system and software security.](https://www.pdfsearch.io/img/0ca672c4a0f94aee9eb3b6c46a223bde.jpg) | Add to Reading ListSource URL: people.cs.vt.eduLanguage: English - Date: 2017-06-29 15:14:44
|
---|
17![Scalable Anonymous Communication with Provable Security Prateek Mittal, Nikita Borisov∗ Dept. of Electrical and Computer Engineering, U. of Illinois at Urbana-Champaign, Carmela Troncoso, Alfredo Rial† Scalable Anonymous Communication with Provable Security Prateek Mittal, Nikita Borisov∗ Dept. of Electrical and Computer Engineering, U. of Illinois at Urbana-Champaign, Carmela Troncoso, Alfredo Rial†](https://www.pdfsearch.io/img/56c42edbef156cad9eb43eb133998a35.jpg) | Add to Reading ListSource URL: carmelatroncoso.comLanguage: English - Date: 2015-11-19 22:20:42
|
---|
18![Jens Knoop, Uwe Zdun (Hrsg.): Software Engineering 2016, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, BonnModel-based Security Verification for Evolving Systems Jan Jürjens 1,2, Sven Wenzel Jens Knoop, Uwe Zdun (Hrsg.): Software Engineering 2016, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, BonnModel-based Security Verification for Evolving Systems Jan Jürjens 1,2, Sven Wenzel](https://www.pdfsearch.io/img/cb0b0e23e919e0afce398f6076fa827c.jpg) | Add to Reading ListSource URL: subs.emis.deLanguage: English - Date: 2016-02-25 13:12:58
|
---|
19![24th International Working Conference, REFSQ 2018, Utrecht, The Netherlands, March 19-22, 2018 Security Requirements Elicitation from Engineering Governance, Risk Management and Compliance Lect. Dr. Ana-Maria Ghiran 24th International Working Conference, REFSQ 2018, Utrecht, The Netherlands, March 19-22, 2018 Security Requirements Elicitation from Engineering Governance, Risk Management and Compliance Lect. Dr. Ana-Maria Ghiran](https://www.pdfsearch.io/img/bd02fb1a34bbf36e9fc9beed670a6dfb.jpg) | Add to Reading ListSource URL: refsq.orgLanguage: English - Date: 2018-03-26 15:20:28
|
---|
20![THE INSTITUTION OF ENGINEERING AND TECHNOLOGY CONFERENCE ON CRIME AND SECURITY TRACKS: THE INSTITUTION OF ENGINEERING AND TECHNOLOGY CONFERENCE ON CRIME AND SECURITY TRACKS:](https://www.pdfsearch.io/img/1bb69be8a72a2f49034b91dcb7736930.jpg) | Add to Reading ListSource URL: www.bmva.orgLanguage: English - Date: 2006-05-19 08:44:00
|
---|