Information school

Results: 25631



#Item
1Curriculum / Didactics

Notice of Intent to Provide Home Instruction DO NOT SUBMIT THIS FORM TO THE VIRGINIA DEPARTMENT OF EDUCATION. PLEASE FORWARD THIS COMPLETED FORM TO YOUR LOCAL SCHOOL DIVISION. Contact information for Virginia’s schoo

Add to Reading List

Source URL: www.doe.virginia.gov

Language: English - Date: 2018-07-10 15:42:11
2Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 08:13:56
3Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-24 15:44:20
42013 IEEE 10th International Conference on Services Computing  Design and Implementation of a Unified Network Information Service Ahmed El-Hassany∗ , Ezra Kissel∗ , Dan Gunter† , Martin Swany∗ , School of Inform

2013 IEEE 10th International Conference on Services Computing Design and Implementation of a Unified Network Information Service Ahmed El-Hassany∗ , Ezra Kissel∗ , Dan Gunter† , Martin Swany∗ , School of Inform

Add to Reading List

Source URL: people.ee.ethz.ch

Language: English - Date: 2017-02-01 15:47:49
5Probabilistic Point-to-Point Information Leakage Tom Chothia∗ , Yusuke Kawamoto∗ , Chris Novakovic∗ and David Parker∗ ∗ School of Computer Science University of Birmingham, Birmingham, UK  Abstract—The output

Probabilistic Point-to-Point Information Leakage Tom Chothia∗ , Yusuke Kawamoto∗ , Chris Novakovic∗ and David Parker∗ ∗ School of Computer Science University of Birmingham, Birmingham, UK Abstract—The output

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
6Is it Really About Me? Message Content in Social Awareness Streams Mor Naaman, Jeffrey Boase, Chih-Hui Lai Rutgers University, School of Communication and Information 4 Huntington St., New Brunswick, NJ 08901, USA {mor,

Is it Really About Me? Message Content in Social Awareness Streams Mor Naaman, Jeffrey Boase, Chih-Hui Lai Rutgers University, School of Communication and Information 4 Huntington St., New Brunswick, NJ 08901, USA {mor,

Add to Reading List

Source URL: individual.utoronto.ca

Language: English - Date: 2017-09-21 13:37:58
7Poster: Detecting Command and Control Servers of Botnet With Randomized Traffic Di Wu1,2, Binxing Fang3, Fangjiao Zhang1,2 1 (Institute of Information Engineering, Chinese Academy of Sciences) 2 (School of Cyber Security

Poster: Detecting Command and Control Servers of Botnet With Randomized Traffic Di Wu1,2, Binxing Fang3, Fangjiao Zhang1,2 1 (Institute of Information Engineering, Chinese Academy of Sciences) 2 (School of Cyber Security

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-11 13:01:38
8A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
9LeakWatch: Estimating Information Leakage from Java Programs Tom Chothia1 , Yusuke Kawamoto2? , and Chris Novakovic1 1  School of Computer Science, University of Birmingham, UK

LeakWatch: Estimating Information Leakage from Java Programs Tom Chothia1 , Yusuke Kawamoto2? , and Chris Novakovic1 1 School of Computer Science, University of Birmingham, UK

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
10Task Scheduling and Trajectory Generation of Multiple Intelligent Vehicles Jennifer David Intelligent Systems Lab School of Information Technology Halmstad University

Task Scheduling and Trajectory Generation of Multiple Intelligent Vehicles Jennifer David Intelligent Systems Lab School of Information Technology Halmstad University

Add to Reading List

Source URL: icaps16.icaps-conference.org

Language: English - Date: 2016-06-09 08:09:24