Vector Security

Results: 220



#Item
61SocialImpact: Systematic Analysis of Underground Social Dynamics ⋆ Ziming Zhao, Gail-Joon Ahn, Hongxin Hu and Deepinder Mahi Laboratory of Security Engineering for Future Computing (SEFCOM) Arizona State University, Te

SocialImpact: Systematic Analysis of Underground Social Dynamics ⋆ Ziming Zhao, Gail-Joon Ahn, Hongxin Hu and Deepinder Mahi Laboratory of Security Engineering for Future Computing (SEFCOM) Arizona State University, Te

Add to Reading List

Source URL: www.public.asu.edu

Language: English - Date: 2012-07-09 02:25:28
62Weakly Supervised Extraction of Computer Security Events from Twitter Alan Ritter Evan Wright

Weakly Supervised Extraction of Computer Security Events from Twitter Alan Ritter Evan Wright

Add to Reading List

Source URL: aritter.github.io

Language: English - Date: 2015-04-14 22:10:51
63To appear, International Joint Conference on Artificial Intelligence (IJCAIOne-Class Conditional Random Fields for Sequential Anomaly Detection Yale Song1 , Zhen Wen2 , Ching-Yung Lin2 , Randall Davis1 MIT Compu

To appear, International Joint Conference on Artificial Intelligence (IJCAIOne-Class Conditional Random Fields for Sequential Anomaly Detection Yale Song1 , Zhen Wen2 , Ching-Yung Lin2 , Randall Davis1 MIT Compu

Add to Reading List

Source URL: labs.yahoo.com

Language: English - Date: 2015-01-28 16:09:52
64VERACODE APPLICATION SECURITY Speed your innovations to market — without sacrificing security Web applications are the #1 attack vector for data breaches, yet only 10% of enterprises test all their critical application

VERACODE APPLICATION SECURITY Speed your innovations to market — without sacrificing security Web applications are the #1 attack vector for data breaches, yet only 10% of enterprises test all their critical application

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2015-04-14 16:19:18
65Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis Damien Octeau1 , Patrick McDaniel1 , Somesh Jha2 , Alexandre Bartel3 , Eric Bodden4 , Jacques Kl

Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis Damien Octeau1 , Patrick McDaniel1 , Somesh Jha2 , Alexandre Bartel3 , Eric Bodden4 , Jacques Kl

Add to Reading List

Source URL: siis.cse.psu.edu

Language: English - Date: 2015-04-11 12:35:57
66GCSP_logo_vector_pantone U

GCSP_logo_vector_pantone U

Add to Reading List

Source URL: www.gcsp.ch

Language: English
67   DATA	
  CENTER	
  IPS	
  COMPARATIVE	
  ANALYSIS	
  	
   Security	
  Value	
  Map	
  (SVM)	
   	
   2014	
  –	
  Thomas	
  Skybakmoen,	
  Jason	
  Pappalexis	
  

  DATA  CENTER  IPS  COMPARATIVE  ANALYSIS     Security  Value  Map  (SVM)     2014  –  Thomas  Skybakmoen,  Jason  Pappalexis  

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-03-24 18:18:26
68Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Support Vector Machines

Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Support Vector Machines

Add to Reading List

Source URL: titania.ctie.monash.edu.au

Language: English - Date: 2013-05-26 19:08:58
69F-Response Now Cloud Service Privacy and Security Summary  PRIVACY AND SECURITY SUMMARY PRIVACY F-Response Now instances (“Now Instances”) leverage a number of design decisions to greatly reduce or eliminate the pote

F-Response Now Cloud Service Privacy and Security Summary PRIVACY AND SECURITY SUMMARY PRIVACY F-Response Now instances (“Now Instances”) leverage a number of design decisions to greatly reduce or eliminate the pote

Add to Reading List

Source URL: www.f-response.com

Language: English - Date: 2014-11-03 13:25:55
70GCSP_logo_vector_pantone U

GCSP_logo_vector_pantone U

Add to Reading List

Source URL: gcsp.ch

Language: English