email

Results: 200859



#Item
31Artificial neural networks / Computational neuroscience / Applied mathematics / Cybernetics / Neuroscience / Convolutional neural network / Long short-term memory / Recurrent neural network / Artificial intelligence

Poster: Summarized Network Behavior Prediction Shih-Chieh Su∗ Qualcomm Inc. San Diego, CA, 92121 Email: ∗

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-26 01:29:24
32Computing / Software engineering / Computer programming / Programming languages / High-level programming languages / Concurrent programming languages / Java platform / Java / Call stack / Stack / Java Class Library / Go

Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation Philipp Holzinger∗ , Ben Hermann† , Johannes Lerch† , Eric Bodden‡ and Mira Mezini† ∗ Fraunhofer SIT, Email: philipp.holzinger@sit

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:15
33

Georgios Fainekos School of Computing, Informatics and Decision Systems Engineering, Arizona State University. Office address: 660 W 6th St, STE, Tempe, AZweb: http://www.public.asu.edu/~gfaineko/, email: f

Add to Reading List

Source URL: www.public.asu.edu

Language: English - Date: 2018-02-09 03:36:24
    34Human behavior / Violence / Sexual abuse / Behavior / Violence against women / Sexual violence / Rape in the United States / Violence against men / Domestic violence / Sexual Assault Awareness Month / Sexual assault

    Email Template: HR/Management notifies employees about Sexual Assault Awareness Month (April) and the Safe at Home program. TO Staff FROM HR/Management SUBJECT

    Add to Reading List

    Source URL: safeathome.iowa.gov

    Language: English - Date: 2018-02-17 07:18:03
    35Gender studies / Gender / Feminism / Culture / Feminism and society / Feminist theory / International relations theory / Gender role / Web of Science / Barbara F. Walter / Gender neutrality in English / Sociology of gender

    International Organization http://journals.cambridge.org/INO Additional services for International Organization: Email alerts: Click here

    Add to Reading List

    Source URL: www.saramitchell.org

    Language: English - Date: 2015-03-06 17:41:49
    36Cryptography / Public-key cryptography / Cryptographic protocols / Key management / Public key infrastructure / DiffieHellman key exchange / Key exchange / Forward secrecy / RSA / Secure channel / XTR / Digital signature

    A Framework for Universally Composable Diffie-Hellman Key Exchange Ralf K¨usters and Daniel Rausch University of Stuttgart Stuttgart, Germany Email: {ralf.kuesters, daniel.rausch}@informatik.uni-stuttgart.de

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:55:11
    37Mathematical software / Application software / Software / Theoretical computer science / Formal methods / Logic in computer science / Discrete mathematics / Verification / Quantifier elimination / Formal verification / Model checking / Computer science

    Ritwika Ghosh phone : (+email : Profile : I am a first year graduate student in Computer Science at the University of Illinois, Urbana-Champaign, interested in formal methods, and appl

    Add to Reading List

    Source URL: web.engr.illinois.edu

    Language: English - Date: 2014-02-28 12:52:15
    38Computing / Information and communications technology / Computer security / Computer network security / Data security / Computer network / Telecommunications engineering / Firewall / Trusted execution environment / Transmission Control Protocol / Packet forwarding / Packet loss

    Alcatraz: Data Exfiltration-Resilient Corporate Network Architecture Daniele E. Asoni ETH Z¨urich Email: Takayuki Sasaki

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English
    39Computing / Hacking / Human behavior / Information and communications technology / Telephone tapping / Computer programming / Hacker / Internet security / Wargame / Security hacker

    Organising Monkeys or How to Run a Hacking Club Andreea-Ina Radu, Sam L. Thomas School of Computer Science University of Birmingham Email: {A.I.Radu, S.L.Thomas}@cs.bham.ac.uk Abstract—We describe the organisation of t

    Add to Reading List

    Source URL: afnom.net

    Language: English - Date: 2018-10-16 09:54:50
    40Search algorithms / Statistical randomness / Matrix / Probability distribution / Hash function / Bitcoin / Scrypt / Random variable / Information retrieval / Information science / Cryptography

    Tensority: an ASIC-friendly Proof of Work Algorithm Based on Tensor Bytom Foundation Email: April 17, 2018 Abstract

    Add to Reading List

    Source URL: bytom.io

    Language: English - Date: 2018-04-18 21:58:58
    UPDATE