Search

Your search keyword '"C.2.0"' showing total 735 results

Search Constraints

Start Over You searched for: Descriptor "C.2.0" Remove constraint Descriptor: "C.2.0"
735 results on '"C.2.0"'

Search Results

151. A Survey on Honeypot Software and Data Analysis

152. Are wearable devices ready for HTTPS? Measuring the cost of secure communication protocols on wearable devices

153. Passive Taxonomy of Wifi Clients using MLME Frame Contents

154. HEAP: Reliable Assessment of BGP Hijacking Attacks

155. Anarchy in Tor: Performance Cost of Decentralization

156. PRI: Privacy Preserving Inspection of Encrypted Network Traffic

157. Open Mobile API: Accessing the UICC on Android Devices

158. DDoS Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions

159. Understanding Mobile Traffic Patterns of Large Scale Cellular Towers in Urban Environment

160. Multiple Configurations LT Codes

162. Evaluation of Contactless Smartcard Antennas

163. Albatross: a Privacy-Preserving Location Sharing System

164. Implementation of a Stream Cipher Based on Bernoulli's Map

165. The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire

166. CBM: A Crypto-Coded Modulation Scheme for Rate Information Concealing and Robustness Boosting

167. Security Evaluation for Mail Distribution Systems

168. IP Tracing and Active Network Response

169. Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based Services

171. Optimal Geo-Indistinguishable Mechanisms for Location Privacy

172. A DDoS-Aware IDS Model Based on Danger Theory and Mobile Agents

173. Machine Learning Techniques for Intrusion Detection

174. Distributed firewalls and IDS interoperability checking based on a formal approach

175. Multi-Source Multi-Path HTTP (mHTTP): A Proposal

176. Blind and robust images watermarking based on wavelet and edge insertion

177. Ensuring High-Quality Randomness in Cryptographic Key Generation

178. Conscript Your Friends into Larger Anonymity Sets with JavaScript

179. The complexity of resolving conflicts on MAC

180. Cryptocat: Adopting Accessibility and Ease of Use as Security Properties

181. A Formal Approach To Firewalls Testing Techniques

182. The Formal Metabasis For Conformity Assessment of Information Security Software and Hardware

183. Hang With Your Buddies to Resist Intersection Attacks

184. Network Access Control Technology - Proposition to contain new security challenges

185. Source Code Analysis to Remove Security Vulnerabilities in Java Socket Programs: A Case Study

186. Design, Implementation, and Operation of a Mobile Honeypot

187. Geo-Indistinguishability: Differential Privacy for Location-Based Systems

188. Efficient Computer Network Anomaly Detection by Changepoint Detection Methods

189. Data Shapes and Data Transformations

190. Securing Your Transactions: Detecting Anomalous Patterns In XML Documents

191. Bridge the Gap: Measuring and Analyzing Technical Data for Social Trust between Smartphones

192. Detecting Spammers via Aggregated Historical Data Set

193. Identifying Discriminating Network Motifs in YouTube Spam

194. Modeling Internet-Scale Policies for Cleaning up Malware

195. A Frame Rate Optimization Framework For Improving Continuity In Video Streaming

196. Probabilistic Analysis of Onion Routing in a Black-box Model

197. Effectiveness and detection of denial of service attacks in Tor

198. Securing Tor Tunnels under the Selective-DoS Attack

199. Multifaceted Faculty Network Design and Management: Practice and Experience Report

200. Location Cheating: A Security Challenge to Location-based Social Network Services

Catalog

Books, media, physical & digital resources