Back to computer science
Directory
Security
23 documents
doc
/
computer-science
/
security
Economic Research on Privacy Regulation Lessons From the Gdpr and Beyond
2024.01.01
certainty: log
·
importance: 5/10
PDF
197.01 KB
Dark Web Pedophile Site Users Cybersecurity Concerns a Lifespan and Survival Ana
2023.01.01
certainty: log
·
importance: 5/10
PDF
311.89 KB
Generative Ai Impact on Email Cyberattacks
2023.01.01
certainty: log
·
importance: 5/10
PDF
202.07 KB
Thermosecure Investigating the Effectiveness of Aidriven Thermal Attacks on Comm
2023.01.01
certainty: log
·
importance: 5/10
PDF
2.96 MB
4 (Wang, 2022)
2022.01.01
certainty: log
·
importance: 5/10
PDF
966.44 KB
Themongoliangeoguessrmeta
2021.01.01
certainty: log
·
importance: 5/10
PDF
33.68 MB
A Cc Code Vulnerability Dataset With Code Changes and Cve Summaries
2020.01.01
certainty: log
·
importance: 5/10
PDF
408.06 KB
Mismorphism the Heart of the Weird Machine
2019.01.01
certainty: log
·
importance: 5/10
PDF
288.44 KB
Best Practices Formal Proofs the Fine Print and Side Effects
2018.01.01
certainty: log
·
importance: 5/10
PDF
193.04 KB
Understanding the Behavior of Hackers While Performing Attack Tasks in a Profess
2018.01.01
certainty: log
·
importance: 5/10
PDF
1.9 MB
Antikernel a Decentralized Secure Hardwaresoftware Operating System Architecture
2015.01.01
certainty: log
·
importance: 5/10
PDF
1.89 MB
Bitsquatting Exploiting Bitflips for Fun or Profit
2013.01.01
certainty: log
·
importance: 5/10
PDF
1.26 MB
Bloom Filter Applications in Network Security a Stateoftheart Survey
2013.01.01
certainty: log
·
importance: 5/10
PDF
1.01 MB
Exploitation and State Machines Programming the Weird Machine Revisited
2011.01.01
certainty: log
·
importance: 5/10
PDF
447.11 KB
Phonotactic Reconstruction of Encrypted Voip Conversations Hookt on Foniks
2011.01.01
certainty: log
·
importance: 5/10
PDF
461.67 KB
So Long and No Thanks for the Externalities the Rational Rejection of Security a
2009.01.01
certainty: log
·
importance: 5/10
PDF
185.46 KB
Why Im Not an Entropist
2009.01.01
certainty: log
·
importance: 5/10
PDF
378.54 KB
Mowbray
2007.01.01
certainty: log
·
importance: 5/10
PDF
226.59 KB
Years Later Lessons From the Multics Security Evaluation
2004.06.01
certainty: log
·
importance: 5/10
PDF
917.23 KB
Timing Attacks on Web Privacy
2000.01.01
certainty: log
·
importance: 5/10
PDF
85.32 KB
An Empirical Study of the Reliability of Unix Utilities
1990.01.01
certainty: log
·
importance: 5/10
PDF
2.25 MB
Computerviruses
1985.01.01
certainty: log
·
importance: 5/10
PDF
2.48 MB
A Small Lathe Built in a Japanese Prison Camp
1949.01.01
certainty: log
·
importance: 5/10
PDF
1.91 MB