Parent directory/ | - | - |
A Multi-layered Approach to Web Application Defense.mp4 | 43.7 MiB | 2021 May 15 22:39 |
A Policy Engineering Framework for Federated Access Management.mp4 | 44.9 MiB | 2021 May 15 22:39 |
Beyond Separation of Duty - An Algebra for Specifying High-level Security Poli..mp4 | 37.6 MiB | 2021 May 15 22:39 |
Categories of Digital Forensic Investigation Techniques.mp4 | 49.0 MiB | 2021 May 15 22:39 |
Chaos, Complexity, Cybernetics and Therminator.mp4 | 47.4 MiB | 2021 May 15 22:39 |
Cross-Drive Forensic Analysis.mp4 | 35.3 MiB | 2021 May 15 22:39 |
Developing an Operational Framework for Integrated System Security.mp4 | 49.1 MiB | 2021 May 15 22:39 |
Digital Identity Management and Theft Protection.mp4 | 42.6 MiB | 2021 May 15 22:39 |
Dynamic and Efficient Key Management for Access Hierarchies.mp4 | 34.5 MiB | 2021 May 15 22:39 |
Forensics Characterization of Printers and Image Capture devices.mp4 | 40.0 MiB | 2021 May 15 22:39 |
Identity Management Strategies and Integration Perspectives.mp4 | 63.8 MiB | 2021 May 15 22:39 |
Invasive Browser Sniffing and Countermeasures.mp4 | 39.2 MiB | 2021 May 15 22:39 |
Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstru..mp4 | 37.7 MiB | 2021 May 15 22:39 |
Net Trust - Identification Through Social Context.mp4 | 48.3 MiB | 2021 May 15 22:39 |
Network Security Begins at Home - Changing Consumer Behavior for i-Safety.mp4 | 59.9 MiB | 2021 May 15 22:39 |
OS-Level Taint Analysis for Malware Investigation and Defense.mp4 | 54.5 MiB | 2021 May 15 22:39 |
On the Evolution of Adversary Models for Security Protocols - from the Beginn..mp4 | 50.2 MiB | 2021 May 15 22:39 |
One Step Forward, Two Steps Back, or Two Steps Forward, One Step Back - A Ten ..mp4 | 55.8 MiB | 2021 May 15 22:39 |
Prioritizing Processes and Controls for Effective and Measurable Security.mp4 | 51.7 MiB | 2021 May 15 22:39 |
Privacy Policies in Web-based Healthcare.mp4 | 42.1 MiB | 2021 May 15 22:39 |
Provable security in mobile ad hoc networks.mp4 | 51.1 MiB | 2021 May 15 22:39 |
Real-Time Visualization of Network Attacks on High-Speed Links.mp4 | 56.0 MiB | 2021 May 15 22:39 |
Recent Attacks on MD5.mp4 | 50.6 MiB | 2021 May 15 22:39 |
Semantic Attacks and Security.mp4 | 48.7 MiB | 2021 May 15 22:39 |
Spoofing-resistant Packet Routing for the Internet.mp4 | 53.2 MiB | 2021 May 15 22:39 |
The Psychology of Computer Deviance - How it can assist in digital evidence a..mp4 | 53.4 MiB | 2021 May 15 22:39 |
The Secure Information Sharing Problem and Solution Approaches.mp4 | 57.2 MiB | 2021 May 15 22:39 |
Toward Autonomic Security Policy Management.mp4 | 32.4 MiB | 2021 May 15 22:39 |
Verification of Integrity for Outsourced Content Publishing and Database Quer..mp4 | 50.6 MiB | 2021 May 15 22:39 |