USENIX

Results: 1311



#Item
171

usenix_logo_full_color_tm

Add to Reading List

Source URL: www.usenix.org

    172

    usenix_logo_full_color_tm

    Add to Reading List

    Source URL: www.usenix.org

      173

      Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes

      Add to Reading List

      Source URL: www.usenix.org

      - Date: 2016-06-22 05:22:56
        174

        The Privacy Policy Paradox Rena Coen Jennifer King Richmond Wong

        Add to Reading List

        Source URL: www.usenix.org

        - Date: 2016-06-22 06:49:19
          175

          The Turtles Project: Design and Implementation of Nested Virtualization Muli Ben-Yehuda† Michael D. Day‡ Zvi Dubitzky†

          Add to Reading List

          Source URL: www.usenix.org

          - Date: 2010-09-23 11:16:26
            176

            LOOM: Bypassing Races in Live Applications with Execution Filters Jingyue Wu, Heming Cui, Junfeng Yang Columbia University 1

            Add to Reading List

            Source URL: static.usenix.org

            - Date: 2010-10-14 13:40:31
              177

              Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks

              Add to Reading List

              Source URL: www.usenix.org

              - Date: 2016-08-10 04:30:42
                178

                RAPTOR: Routing Attacks on Privacy in Tor Yixin Sun and Anne Edmundson, Princeton University; Laurent Vanbever, ETH Zürich; Oscar Li, Jennifer Rexford, Mung Chiang, and Prateek Mittal, Princeton University https://www.u

                Add to Reading List

                Source URL: www.usenix.org

                - Date: 2016-02-22 01:46:43
                  179

                  When Poll is Better than Interrupt Jisoo Yang Dave B. Minturn Frank Hady

                  Add to Reading List

                  Source URL: static.usenix.org

                  - Date: 2012-01-30 15:25:02
                    180

                    Understanding Advanced Persistent Threats A Case Study NED MORAN Ned Moran has worked in

                    Add to Reading List

                    Source URL: www.usenix.org

                      UPDATE