Vector Security

Results: 220



#Item
11IMPACT OF BGP SECURITY DEPLOYMENT ON ROUTE VALIDATION ALEX ȘTEFĂNESCU 2 MarBGP SECURITY ISSUES

IMPACT OF BGP SECURITY DEPLOYMENT ON ROUTE VALIDATION ALEX ȘTEFĂNESCU 2 MarBGP SECURITY ISSUES

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2011-03-03 09:07:54
12Enhancing One-class Support Vector Machines for Unsupervised Anomaly Detection Mennatallah Amer1, Markus Goldstein2, Slim Abdennadher1 1  2

Enhancing One-class Support Vector Machines for Unsupervised Anomaly Detection Mennatallah Amer1, Markus Goldstein2, Slim Abdennadher1 1 2

Add to Reading List

Source URL: www.outlier-analytics.org

Language: English - Date: 2013-08-13 15:59:38
13Robust Geotag Generation for Security Applications Di Qiu*, Sherman Lo, Dan Boneh and Per Enge Stanford University, Stanford, CA Why geo-security?

Robust Geotag Generation for Security Applications Di Qiu*, Sherman Lo, Dan Boneh and Per Enge Stanford University, Stanford, CA Why geo-security?

Add to Reading List

Source URL: scpnt.stanford.edu

Language: English - Date: 2009-10-23 18:24:49
14FB Logos-Vector_OpenersBlueWtaglines.eps

FB Logos-Vector_OpenersBlueWtaglines.eps

Add to Reading List

Source URL: www.crystalco.com

Language: English - Date: 2015-05-14 10:30:03
15Hidden Voice Commands Nicholas Carlini∗ University of California, Berkeley Tavish Vaidya Georgetown University Clay Shields

Hidden Voice Commands Nicholas Carlini∗ University of California, Berkeley Tavish Vaidya Georgetown University Clay Shields

Add to Reading List

Source URL: security.cs.georgetown.edu

Language: English - Date: 2016-06-29 23:07:54
16IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. X, NO. X, MONTH 20XX  1 Joint Speaker Verification and Anti-Spoofing in the i-Vector Space

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. X, NO. X, MONTH 20XX 1 Joint Speaker Verification and Anti-Spoofing in the i-Vector Space

Add to Reading List

Source URL: www.cstr.inf.ed.ac.uk

Language: English - Date: 2015-09-29 11:06:25
17T he Philadelphia C ontributionship 263rd Annual Report 2015

T he Philadelphia C ontributionship 263rd Annual Report 2015

Add to Reading List

Source URL: www.contributionship.com

Language: English - Date: 2016-03-18 13:24:26
18Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University   Adrian Perrig

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University Adrian Perrig

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:12
19The Security of Ciphertext Stealing Phillip Rogaway1 , Mark Wooding2 , and Haibin Zhang1 1 Dept. of Computer Science, University of California, Davis, USA 2

The Security of Ciphertext Stealing Phillip Rogaway1 , Mark Wooding2 , and Haibin Zhang1 1 Dept. of Computer Science, University of California, Davis, USA 2

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2012-05-16 03:26:41
20VRSN_logo_vertical_CMYK_vector

VRSN_logo_vertical_CMYK_vector

Add to Reading List

Source URL: www.verisign.com

Language: English - Date: 2016-06-13 14:05:07