Search

Your search keyword '"Cidon, Asaf"' showing total 99 results

Search Constraints

Start Over You searched for: Author "Cidon, Asaf" Remove constraint Author: "Cidon, Asaf"
99 results on '"Cidon, Asaf"'

Search Results

1. Characterizing the Networks Sending Enterprise Phishing Emails

2. Cookie Monster: Efficient On-device Budgeting for Differentially-Private Ad-Measurement Systems

3. BPF-oF: Storage Function Pushdown Over the Network

4. Turbo: Effective Caching in Differentially-Private Databases

5. Karma: Resource Allocation for Dynamic Demands

6. Monitoring and Adapting ML Models on Mobile Devices

7. DPack: Efficiency-Oriented Privacy Budget Scheduling

8. A Tale of Two Models: Constructing Evasive Attacks on Edge Models

9. Treehouse: A Case For Carbon-Aware Datacenter Software

10. Memtrade: A Disaggregated-Memory Marketplace for Public Clouds

11. Privacy Budget Scheduling

12. BPF for storage: an exokernel-inspired approach

13. Characterizing and Taming Model Instability Across Edge Devices

14. Efficient Compactions Between Storage Tiers with PrismDB

15. A Large-Scale Analysis of Attacker Activity in Compromised Enterprise Accounts

16. Cost-Aware Robust Tree Ensembles for Security Applications

17. Hydra: Resilient and Highly Available Remote Memory

18. Detecting and Characterizing Lateral Phishing at Scale

19. Bandana: Using Non-volatile Memory for Storing Deep Learning Models

20. Live Recovery of Bit Corruptions in Datacenter Storage Systems

21. Flashield: a Key-value Cache that Minimizes Writes to Flash

22. Memshare: a Dynamic Multi-tenant Memory Key-value Cache

23. Reducing Datacenter Compute Carbon Footprint by Harnessing the Power of Specialization: Principles, Metrics, Challenges and Opportunities.

24. Alistair: Efficient On-device Budgeting for Differentially-Private Ad-Measurement Systems

25. Mars Attacks!

29. Boost: Effective Caching in Differentially-Private Databases

32. Packing Privacy Budget Efficiently

33. Neuroshard

34. BPF for storage

35. Reducing DRAM footprint with NVM in Facebook

36. Cliffhanger: Scaling Performance Cliffs in Web Memory Caches

37. Cliffhanger: Scaling Performance Cliffs in Web Memory Caches

38. The only way to control BYOD is to embrace it

39. Ongoing HIPAA, HITECH hurdles

40. IT only guards the front gate

41. Flashback

45. MARS

46. Venus

47. Why network security can't guarantee client confidentiality.

48. Ignorance isn't bliss when it comes to HIPAA compliance.

49. Protecting IP in the cloud.

50. Do we now need to account for a ransomware attack in the IT budget?

Catalog

Books, media, physical & digital resources