×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [acm workshop]
Home >
acm workshop
Curriculum Vitae Stephen M. Pizer September 1997.doc.doc.doc.doc
937 views
© 2005 Ravi Sandhu Role Usage and Activation Hierarchies (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security.
214 views
PhishZoo: Detecting Phishing Websites By Looking at Them Sadia Afroz Rachel Greenstadt.
216 views
An Introduction to Issues Regarding Data Integrity & Virtual Machine Security.
218 views
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage Hierarchical Clustering
142 views
rbacDSL - slides from Code Generation 2014
331 views
Deepthi ratnayake
348 views
Software Testing: Introduction
332 views
Situation based analysis and control for supporting Event-web applications
1.366 views
From Events to Situations: An Event-web perspective
894 views
HathiTrust Research Center Data Capsule Overview 09.10.14
247 views
Approximating Attack Surfaces with Stack Traces [ICSE 15]
63 views
Next >