×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [software attacks]
Home >
software attacks
Computer Viruses
186 views
Microsoft SQL Server - Intel Processors and Microsoft Power Pivot Presentation
639 views
Software Assurance Software Assurance
912 views
ASFWS 2011 : Code obfuscation: Quid Novi ?
1.285 views
Wave Systems Corp. Brochure
817 views
Hardware Security: Trusted Platform Module Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources.
213 views
Mind the Gap: Updating FIPS 140 Steve Weingart Futurex 864 Old Boerne Rd. Bulverde, TX 78163
[email protected]
Steve R. White IBM Thomas J. Watson Research.
214 views
Personalized Cybersecurity for Dummies Jaime G. Carbonell Eugene Fink Mehrbod Sharifi Application of machine learning and crowdsourcing to adapt cybersecurity.
217 views
Department of Electrical and Computer Engineering Kekai Hu, Harikrishnan Chandrikakutty, Deepak Unnikrishnan, Tilman Wolf, and Russell Tessier Department.
212 views
Protecting Data on Smartphones and Tablets from Memory Attacks Presenter: Luren Wang.
214 views
DRM: Technology overview Keunwoo Lee CSE 590 SO 19 April 2005.
218 views
Pervasive Self-Regeneration through Concurrent Model-Based Execution Brian Williams (PI) Paul Robertson MIT Computer Science and Artificial Intelligence.
215 views
Next >