224 results on '"Doug Tygar"'
Search Results
2. Organisational culture, procedural countermeasures, and employee security behaviour: A qualitative study.
3. Investigation of Employee Security Behaviour: A Grounded Theory Approach.
4. Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels.
5. Remote Operating System Classification over IPv6.
6. Large-Margin Convex Polytope Machine.
7. Managing Employee Security Behaviour in Organisations: The Role of Cultural Factors and Individual Values.
8. Adversarial Active Learning.
9. CAPTCHA Using Strangeness in Machine Translation.
10. CITRIC: A low-bandwidth wireless camera network platform.
11. Open problems in the security of learning.
12. Optimal ROC Curve for a Combination of Classifiers.
13. Dynamic pharming attacks and locked same-origin policies for web browsers.
14. The battle against phishing: Dynamic Security Skins.
15. A low-bandwidth camera sensor platform with applications in smart camera networks.
16. Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371).
17. Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371).
18. Near-Optimal Evasion of Convex-Inducing Classifiers.
19. OSNP: Secure wireless authentication protocol using one-time key.
20. A model for secure protocols and their compositions.
21. Cyber defense technology networking and evaluation.
22. Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication.
23. SWOON: A Testbed for Secure Wireless Overlay Networks.
24. Exploiting Machine Learning to Subvert Your Spam Filter.
25. A User Study Design for Comparing the Security of Registration Protocols.
26. Characterizing Botnets from Email Spam Records.
27. Security Analytics in the Context of Adversarial Machine Learning.
28. On Modeling the Costs of Censorship.
29. I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis.
30. NetBill: an Internet commerce system optimized for network-delivered services.
31. Evading Anomaly Detection through Variance Injection Attacks on PCA.
32. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0.
33. Electronic Auctions with Private Bids.
34. Token and Notational Money in Electronic Commerce.
35. Miro semantics for security.
36. Micro tools.
37. Efficient netlist comparison using hierarchy and randomization.
38. Advances in Software Engineering Techniques
39. The Security of Machine Learning
40. Panel: Authentication in Constrained Environments
41. Computer Security in the 21st Century
42. Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371)
43. Computer Security in the 21st Century
44. Randomly Partitioned Encryption for Cloud Databases
45. Incremental Analysis of Evolving Administrative Role Based Access Control Policies
46. Integrity Assurance for Outsourced Databases without DBMS Modification
47. Optimizing Integrity Checks for Join Queries in the Cloud
48. Mining Attribute-Based Access Control Policies from Logs
49. GreenBrowsing: Towards Energy Efficiency in Browsing Experience
50. Scalable and Accurate Causality Tracking for Eventually Consistent Stores
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.