Security engineering

Results: 11317



#Item
741Computer file formats / Public safety / Videotelephony / Closed-circuit television / Security engineering / File format / Data compression / Security / Surveillance / National security

A Universal Digital CCTV Viewer Manufacturers working together on a universal digital CCTV viewer www. siraview.com

Add to Reading List

Source URL: www.siraview.com

Language: English - Date: 2012-02-06 11:22:45
742

OPINION Why Offensive Security Needs Engineering Textbooks Or, How to Avoid a Replay of “Crypto Wars” in Security Research

Add to Reading List

Source URL: www.usenix.org

    743

    Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities Sangho Lee, Youngsok Kim, Jangwoo Kim, and Jong Kim Department of Computer Science and Engineering POSTECH, Korea {sangho2, elixir, jangwoo, jk

    Add to Reading List

    Source URL: www.ieee-security.org

    - Date: 2014-04-21 13:48:10
      744

      Knowledge discovery, Visual Analytics and Innovation in Social Computing workshop by Tallinn University of Technology Based on Master’s Programme in Software Engineering and Cyber Security Estonia is well known for its

      Add to Reading List

      Source URL: ttu.ee

      - Date: 2012-07-09 10:18:10
        745

        1 Poster: Privacy Aspects of Health Related Information Sharing in Online Social Networks Sadegh Torabi and Konstantin Beznosov Department of Electrical and Computer Engineering

        Add to Reading List

        Source URL: www.ieee-security.org

        - Date: 2013-05-17 10:01:49
          746

          SUCCES STORIES 2014 OTC Engineering A CATALAN AND A GERMAN ENTERPRISE INTEGRATE THEIR SOLUTIONS FOR VEHICLES A new step in smart mobility through security technologies

          Add to Reading List

          Source URL: www.een.cat

          - Date: 2015-06-16 04:52:22
            747

            Poster—The Security Cards: A Security Threat Brainstorming Toolkit Tamara Denning†, Batya Friedman‡, Tadayoshi Kohno† † Computer Science & Engineering

            Add to Reading List

            Source URL: www.ieee-security.org

            - Date: 2014-05-19 18:56:28
              748

              2014 IEEE Security and Privacy Workshops Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits Frank L. Greitzer PsyberAnalytix

              Add to Reading List

              Source URL: ieee-security.org

              Language: English - Date: 2014-04-30 03:10:15
                749

                Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities Sangho Lee, Youngsok Kim, Jangwoo Kim, and Jong Kim Department of Computer Science and Engineering POSTECH, Korea {sangho2, elixir, jangwoo, jk

                Add to Reading List

                Source URL: ieee-security.org

                Language: English - Date: 2014-04-21 13:48:10
                  750

                  2011 IEEE Symposium on Security and Privacy Using Fingerprint Authentication to Reduce System Security: An Empirical Study Hugh Wimberly, Lorie M. Liebrock Department of Computer Science & Engineering

                  Add to Reading List

                  Source URL: www.ieee-security.org

                  Language: English - Date: 2011-04-10 18:06:50
                    UPDATE