Search Results
2. Behavior-Based Modeling and Its Application to Email Analysis
3. Casting Out Demons: Sanitizing Training Data for Anomaly Sensors
4. Security by Checklist
5. Identity and Security
6. Privacy Enhanced Access Control for Outsourced Data Sharing
7. Symbiotes and defensive Mutualism: Moving Target Defense
8. Toward Usable Access Control for End-users: A Case Study of Facebook Privacy Settings
9. Societal Computing
10. When Firmware Modifications Attack: A Case Study of Embedded Exploitation
- « Previous
- Next »
- 1
- 2
- 3
- 4