Parent directory/ | - | - |
A Semantic Baseline for Spam Filtering.mp4 | 42.0 MiB | 2021 May 17 01:16 |
Active Cyber Network Defense with Denial and Deception.mp4 | 42.7 MiB | 2021 May 17 01:16 |
BIOS Chronomancy - Using Timing-Based Attestation to Detect Firmware Rootkits.mp4 | 37.7 MiB | 2021 May 17 01:16 |
Differentially Private Publishing of Geospatial Data.mp4 | 42.9 MiB | 2021 May 17 01:16 |
Economic Policy and Cyber Challenges in Estonia.mp4 | 46.8 MiB | 2021 May 17 01:16 |
Facebook - Protecting a billion identities without losing (much) sleep.mp4 | 40.1 MiB | 2021 May 17 01:16 |
GPRI Global Connections Lecture Series - Mr. Norman R. Augustine.mp4 | 68.6 MiB | 2021 May 17 01:16 |
I m not stealing, I m merely borrowing - Plagiarism in Smartphone App Markets.mp4 | 39.7 MiB | 2021 May 17 01:16 |
Identity-Based Internet Protocol Network.mp4 | 22.6 MiB | 2021 May 17 01:16 |
Information Security Challenges in an Academic Environment.mp4 | 33.0 MiB | 2021 May 17 01:16 |
Membership Privacy - A Unifying Framework For Privacy Definitions.mp4 | 40.9 MiB | 2021 May 17 01:16 |
Minimizing Private Data Disclosures in the Smart Grid.mp4 | 32.5 MiB | 2021 May 17 01:16 |
New possibilities of steganography based on Kuznetsov-Tsybakov problem.mp4 | 36.3 MiB | 2021 May 17 01:16 |
Regulatory Compliance Software Engineering.mp4 | 36.8 MiB | 2021 May 17 01:16 |
Systems of Systems - Opportunities and Challenges.mp4 | 42.5 MiB | 2021 May 17 01:16 |
The Durkheim Project - Privacy Considerations in Predicting Military and Vete..mp4 | 36.5 MiB | 2021 May 17 01:16 |
Towards Automated Problem Inference from Trouble Tickets.mp4 | 38.1 MiB | 2021 May 17 01:16 |
Trust Management for Publishing Graph Data.mp4 | 45.2 MiB | 2021 May 17 01:16 |
Using Probabilistic Generative Models for Ranking Risks of Android Apps.mp4 | 33.0 MiB | 2021 May 17 01:16 |
Whole Genome Sequencing - Innovation Dream or Privacy Nightmare.mp4 | 44.7 MiB | 2021 May 17 01:16 |
Yahoo Messenger Forensics on Windows Vista and Windows 7.mp4 | 25.1 MiB | 2021 May 17 01:16 |