×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [usenix security symposium]
Documents
Privacy-preserving Data Mining and Machine Learning
498 views
Documents
Sec13 Paper Imeson Copy
231 views
Documents
login_1310
148 views
Documents
Login 1304 Online
68 views
Social Media
Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem
34 views
Technology
Доходы киберрынка
117 views
Documents
18-447 Computer Architecture Lecture 2: Fundamental Concepts and ISA Prof. Onur Mutlu Carnegie Mellon University Spring 2013, 1/16/2013
231 views
Documents
All Your Browser-saved Passwords Could Belong to Us - A Security Analysis and a Cloud-based New Design By Rui Zhao, Chuan Yue ACM Conference on Data and
217 views
Documents
Denial of Service. Denial of Service Attacks Unlike other forms of computer attacks, goal isn’t access or theft of information or services The goal is
215 views
Documents
DETECTING TARGETED ATTACKS USING SHADOW HONEYPOTS AUTHORS: K. G. Anagnostakisy, S. Sidiroglouz, P. Akritidis, K. Xinidis, E. Markatos, A. D. Keromytisz
216 views
Documents
[email protected]
A Framework for Packe Trace Manipulation Christian Kreibich
217 views
Documents
JShield: Towards Real-time and Vulnerability-based Detection of Polluted Drive-by Download Attacks Yinzhi Cao*, Xiang Pan**, Yan Chen** and Jianwei Zhuge***
214 views
< Prev
Next >