Back to computer science
Directory

Security

23 documents

Economic Research on Privacy Regulation Lessons From the Gdpr and Beyond2024.01.01
certainty: log·importance: 5/10
PDF197.01 KB
Dark Web Pedophile Site Users Cybersecurity Concerns a Lifespan and Survival Ana2023.01.01
certainty: log·importance: 5/10
PDF311.89 KB
Generative Ai Impact on Email Cyberattacks2023.01.01
certainty: log·importance: 5/10
PDF202.07 KB
Thermosecure Investigating the Effectiveness of Aidriven Thermal Attacks on Comm2023.01.01
certainty: log·importance: 5/10
PDF2.96 MB
4 (Wang, 2022)2022.01.01
certainty: log·importance: 5/10
PDF966.44 KB
Themongoliangeoguessrmeta2021.01.01
certainty: log·importance: 5/10
PDF33.68 MB
A Cc Code Vulnerability Dataset With Code Changes and Cve Summaries2020.01.01
certainty: log·importance: 5/10
PDF408.06 KB
Mismorphism the Heart of the Weird Machine2019.01.01
certainty: log·importance: 5/10
PDF288.44 KB
Best Practices Formal Proofs the Fine Print and Side Effects2018.01.01
certainty: log·importance: 5/10
PDF193.04 KB
Understanding the Behavior of Hackers While Performing Attack Tasks in a Profess2018.01.01
certainty: log·importance: 5/10
PDF1.9 MB
Antikernel a Decentralized Secure Hardwaresoftware Operating System Architecture2015.01.01
certainty: log·importance: 5/10
PDF1.89 MB
Bitsquatting Exploiting Bitflips for Fun or Profit2013.01.01
certainty: log·importance: 5/10
PDF1.26 MB
Bloom Filter Applications in Network Security a Stateoftheart Survey2013.01.01
certainty: log·importance: 5/10
PDF1.01 MB
Exploitation and State Machines Programming the Weird Machine Revisited2011.01.01
certainty: log·importance: 5/10
PDF447.11 KB
Phonotactic Reconstruction of Encrypted Voip Conversations Hookt on Foniks2011.01.01
certainty: log·importance: 5/10
PDF461.67 KB
So Long and No Thanks for the Externalities the Rational Rejection of Security a2009.01.01
certainty: log·importance: 5/10
PDF185.46 KB
Why Im Not an Entropist2009.01.01
certainty: log·importance: 5/10
PDF378.54 KB
Mowbray2007.01.01
certainty: log·importance: 5/10
PDF226.59 KB
Years Later Lessons From the Multics Security Evaluation2004.06.01
certainty: log·importance: 5/10
PDF917.23 KB
Timing Attacks on Web Privacy2000.01.01
certainty: log·importance: 5/10
PDF85.32 KB
An Empirical Study of the Reliability of Unix Utilities1990.01.01
certainty: log·importance: 5/10
PDF2.25 MB
Computerviruses1985.01.01
certainty: log·importance: 5/10
PDF2.48 MB
A Small Lathe Built in a Japanese Prison Camp1949.01.01
certainty: log·importance: 5/10
PDF1.91 MB

in Naperville, IL
Last visitor from Mitaka, Japan