1![Two Methods for Detecting Malware Maciej Korczyński, Gilles Berger-Sabbatel, and Andrzej Duda Grenoble Institute of Technology, CNRS Grenoble Informatics Laboratory UMR, rue de la Passerelle, BPSaint Two Methods for Detecting Malware Maciej Korczyński, Gilles Berger-Sabbatel, and Andrzej Duda Grenoble Institute of Technology, CNRS Grenoble Informatics Laboratory UMR, rue de la Passerelle, BPSaint](https://www.pdfsearch.io/img/aece077d854cb1ef8d9d7338a02e31dd.jpg) | Add to Reading ListSource URL: mkorczynski.comLanguage: English - Date: 2015-02-15 17:10:50
|
---|
2![® Luxriot VMS Software Luxriot is an open architecture Video Management System (VMS). Luxriot accepts MJPEG, MPEG4 and H.264 as well as HD and megapixel video streams ® Luxriot VMS Software Luxriot is an open architecture Video Management System (VMS). Luxriot accepts MJPEG, MPEG4 and H.264 as well as HD and megapixel video streams](https://www.pdfsearch.io/img/01b3a59a17c98d142cb9414d9584fb4d.jpg) | Add to Reading ListSource URL: www.luxriot.comLanguage: English - Date: 2016-05-08 15:59:44
|
---|
3![Application Note Lync 2010 deployment guide Document version: v1.2 Last update: Application Note Lync 2010 deployment guide Document version: v1.2 Last update:](https://www.pdfsearch.io/img/7ba478a725ee4e01acad36ff11a809cc.jpg) | Add to Reading ListSource URL: www.haproxy.comLanguage: English - Date: 2014-04-28 06:57:30
|
---|
4![CALEA
II:
Risks
of
Wiretap
Modifications
to
Endpoints
Ben
Adida
Collin
Anderson
Annie
I.
Anton
(Georgia
Institute
of
Technology)
Matt
Bl CALEA
II:
Risks
of
Wiretap
Modifications
to
Endpoints
Ben
Adida
Collin
Anderson
Annie
I.
Anton
(Georgia
Institute
of
Technology)
Matt
Bl](https://www.pdfsearch.io/img/6916efb96b15e31aacd463649e8fa657.jpg) | Add to Reading ListSource URL: www.cs.cornell.eduLanguage: English - Date: 2013-05-22 16:19:18
|
---|
5![An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Salman A. Baset and Henning G. Schulzrinne Department of Computer Science Columbia University, New York NY 10027 {salman,hgs}@cs.columbia.edu An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Salman A. Baset and Henning G. Schulzrinne Department of Computer Science Columbia University, New York NY 10027 {salman,hgs}@cs.columbia.edu](https://www.pdfsearch.io/img/47522bfc17375b97c6b83471c1c02bb8.jpg) | Add to Reading ListSource URL: www.scs.stanford.eduLanguage: English - Date: 2008-04-05 20:12:49
|
---|
6![An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Salman A. Baset and Henning G. Schulzrinne Department of Computer Science Columbia University, New York NY 10027 {salman,hgs}@cs.columbia.edu An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Salman A. Baset and Henning G. Schulzrinne Department of Computer Science Columbia University, New York NY 10027 {salman,hgs}@cs.columbia.edu](https://www.pdfsearch.io/img/8f3412b6af0e811e05f3654d2b63e64b.jpg) | Add to Reading ListSource URL: www.scs.stanford.eduLanguage: English - Date: 2008-09-20 23:19:36
|
---|
7![Redesigning the Internet for the 21st Century Our vision is to fundamentally redesign the way how data is routed, transmitted and handled on the Internet in order to provide private, confidential and censorship-resistant Redesigning the Internet for the 21st Century Our vision is to fundamentally redesign the way how data is routed, transmitted and handled on the Internet in order to provide private, confidential and censorship-resistant](https://www.pdfsearch.io/img/78acbbdf5e95aefa65157a508c47691b.jpg) | Add to Reading ListSource URL: www.wauland.deLanguage: English - Date: 2014-06-10 16:47:52
|
---|
8![Secure Calls & Messages Best practice cryptography Peer-to-peer communication Maximum security Superior voice quality Secure Calls & Messages Best practice cryptography Peer-to-peer communication Maximum security Superior voice quality](https://www.pdfsearch.io/img/e970d4224e4258845eb56d2f6d8de58f.jpg) | Add to Reading ListSource URL: www.crypttalk.comLanguage: English - Date: 2015-02-20 10:27:12
|
---|
9![SkypeMorph: Protocol Obfuscation for Tor Bridges∗ Hooman Mohajeri Moghaddam Baiyu Li Mohammad Derakhshani Ian Goldberg Cheriton School of Computer Science SkypeMorph: Protocol Obfuscation for Tor Bridges∗ Hooman Mohajeri Moghaddam Baiyu Li Mohammad Derakhshani Ian Goldberg Cheriton School of Computer Science](https://www.pdfsearch.io/img/7305ff125280e4a063af1a234c0d3aca.jpg) | Add to Reading ListSource URL: www.cypherpunks.caLanguage: English - Date: 2012-08-25 10:47:50
|
---|
10![Product Datasheet Protocol and Application Plugin Library Qosmos ixEngine® is the most complete DPI engine on the market, with the ability to identify all major protocols and applications circulating on fixed and mobil Product Datasheet Protocol and Application Plugin Library Qosmos ixEngine® is the most complete DPI engine on the market, with the ability to identify all major protocols and applications circulating on fixed and mobil](https://www.pdfsearch.io/img/8e5db1d587001ee8af0a84b301cdb69d.jpg) | Add to Reading ListSource URL: www.qosmos.comLanguage: English - Date: 2015-03-31 11:09:09
|
---|