Security

Results: 374843



#Item
91Finance / Economy / Money / Financial markets / Brokerage firms / Commodity markets / Broker-dealer / Fixed income / Order / Manning rule

Finra Rule 5320 Disclosure Rule 5320 generally provides that a broker-dealer that accepts and holds an order in an equity security from its own customer or customer of another broker-dealer is prohibited from trading tha

Add to Reading List

Source URL: www.traditionamericas.com

Language: English - Date: 2017-03-31 11:07:20
92Stock market / Finance / Initial public offering / 73rd United States Congress / U.S. Securities and Exchange Commission / Prospectus / Securities Act / Initial coin offering / Security / Money / Economy

BUILDING A REGULATED INVESTMENT PLATFORM AND SECURITY TOKEN EXCHANGE FOR START-UPS AND SMEs Q4 2018 Disclaimer

Add to Reading List

Source URL: kambio.io

Language: English - Date: 2018-10-18 01:47:00
93Computer security / Security engineering / Cyberwarfare / Prevention / Cybercrime / National security / Computer network security / Cyberattack / Capture the flag / Information security / Denial-of-service attack

Poster: Shell We Play A Game? CTF-as-a-service for Security Education Adam Doup´e and Giovanni Vigna Arizona State University and UC Santa Barbara ,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 00:24:26
94Computing / Software engineering / Computer security / Hacking / Cross-site scripting / Cross-site request forgery / Security / JavaScript / SQL injection / HTTP cookie / Code injection / World Wide Web

EECS 388 Intro to Computer Security September 30, 2016 Project 2: Web Security

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:22
95Computational neuroscience / Chemistry / Applied mathematics / Artificial neural networks / Phase transitions / Statistics / Scientific modeling / Design of experiments / Deep learning / Distillation / Outlier / Surrogate model

A full version of this paper is available at https://papernot.fr/files/extending-distillation.pdf Poster: Extending Defensive Distillation Nicolas Papernot and Patrick McDaniel Pennsylvania State University {ngp5056,mcd

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 02:41:14
96Cryptography / Obfuscation / Computer security / Password / Security / Cyberwarfare / Salt / Identity management / Password policy / Password fatigue

Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 08:13:56
97Security / Security breaches / Prevention / Ransomware / Cybercrime / Malware / Locky / Computer security

Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-24 15:44:20
98Computing / Software engineering / Data types / Computer programming / Primitive types / Formal languages / Formal methods / ANSI/ISO C Specification Language / C / String / Frama-C / Permutation

Context Generation from Formal Specifications for C Analysis Tools Michele Alberti1? and Julien Signoles2 TrustInSoft, Paris, France CEA LIST, Software Reliability and Security Laborator

Add to Reading List

Source URL: julien.signoles.free.fr

Language: English - Date: 2017-09-15 19:04:15
99System software / Software / Utility software / Computer forensics / Password / Security / Disk image / VirtualBox / Autopsy / File system / Forensic science

EECS 388 Intro to Computer Security November 18, 2016 Project 5: Forensics

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:22
100Cryptography / Post-quantum cryptography / Quantum cryptography / Emerging technologies / Quantum computing / Key / Supersingular isogeny key exchange / Ring learning with errors key exchange

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 and Jan Verschuren1 1 Netherlands National Communication Security Agency (NLNCSA)

Add to Reading List

Source URL: joostrijneveld.nl

Language: English - Date: 2018-09-03 08:56:26
UPDATE