Parent directory/ | - | - |
A quant looks at the future.mp4 | 57.4 MiB | 2021 May 16 02:24 |
Applying Recreational Mathematics to Secure Multiparty Computation.mp4 | 43.4 MiB | 2021 May 16 02:24 |
Assured Information Sharing between Trustworthy, Semi-trustworthy and Untrust..mp4 | 59.5 MiB | 2021 May 16 02:24 |
Automatic Debugging and Verification of RTL-Specified Real-Time Systems via I..mp4 | 47.5 MiB | 2021 May 16 02:24 |
CANDID - Preventing SQL Injection Attacks using Dynamic Candidate Evaluations.mp4 | 36.9 MiB | 2021 May 16 02:24 |
Computer-Related Incidents - Factors Related to Cause and Prevention.mp4 | 49.8 MiB | 2021 May 16 02:24 |
Cyber Security and the - NEW - world enterprise.mp4 | 48.9 MiB | 2021 May 16 02:24 |
Dumb Ideas in Computer Security.mp4 | 47.6 MiB | 2021 May 16 02:24 |
From Securing Navigation Systems to Securing Wireless Communication.mp4 | 45.2 MiB | 2021 May 16 02:24 |
Hiding the Message Behind the Words - Advances in Natural Language Watermarkin..mp4 | 31.9 MiB | 2021 May 16 02:24 |
Intrusion Detection Event Correlation - Approaches, Benefits and Pitfalls.mp4 | 49.0 MiB | 2021 May 16 02:24 |
Mathematically Defining Privacy.mp4 | 47.1 MiB | 2021 May 16 02:24 |
Passwords Decay, Words Endure - Towards Secure and Re-usable Multiple Password..mp4 | 59.6 MiB | 2021 May 16 02:24 |
Protecting Data Privacy - A Practical Guide to Managing Risk.mp4 | 31.8 MiB | 2021 May 16 02:24 |
Protocols and Systems for Privacy Preserving Protection of Digital Identity.mp4 | 44.7 MiB | 2021 May 16 02:24 |
Research Challenges in Assured Information Sharing.mp4 | 40.6 MiB | 2021 May 16 02:24 |
Role Discovery.mp4 | 42.9 MiB | 2021 May 16 02:24 |
Scenario-Driven Construction of Enterprise Information Policy.mp4 | 54.9 MiB | 2021 May 16 02:24 |
Secure Virtualization.mp4 | 54.8 MiB | 2021 May 16 02:24 |
Security issues within embedded software development.mp4 | 42.3 MiB | 2021 May 16 02:24 |
Security, Soft Boundaries, and oh-so-subtle Strategies How to Play Chess Whil..mp4 | 55.9 MiB | 2021 May 16 02:24 |
The Effect of Rootkits on the Corporate Environment.mp4 | 35.3 MiB | 2021 May 16 02:24 |
Towards Effective and Efficient Behavior-based Trust Models.mp4 | 45.3 MiB | 2021 May 16 02:24 |
WHAT IS INFORMATION.mp4 | 53.4 MiB | 2021 May 16 02:24 |
What Every Engineer Needs To Know About Security And Where To Learn It.mp4 | 45.9 MiB | 2021 May 16 02:24 |
Wireless Router Insecurity - The Next Crimeware Epidemic.mp4 | 46.2 MiB | 2021 May 16 02:24 |