Ajax loader
By using our website, you agree to our use of cookies as described in Cookie Policy
 For more images, please visit our Collections page 
String matching architectures for network security on reconfigurable computers
PDF
Enabling symbolic execution string comparison during code-analysis of malicious binaries
PDF
Improving network security through collaborative sharing
PDF
Network reconnaissance using blind techniques
PDF
brin_thesis_07202011
PDF
High performance web-caching architecture
PDF
Collaborative detection and filtering of DDoS attacks in ISP core networks
PDF
Moloch: creating games with alternative mental state goals to move beyond flow
PDF
Peer-to-peer content networking with copyright protection and jitter-free streaming
PDF
PDF
Modeling and recognition of events from temporal sensor data for energy applications
PDF
A system for trust evaluation and management leveraging trusted computing technology
PDF
Game theoretic deception and threat screening for cyber security
PDF
PDF
Efficient reachability query evaluation in large spatiotemporal contact networks
PDF
Analysis and countermeasures of worm propagations and interactions in wired and wireless networks
PDF
submit_update1.pdf
PDF
submit_update1.pdf
PDF
Pdf
Spam e-mail filtering via global and user-level dynamic ontologies
Microsoft Word - Dissertation_7-27-2011_complete.docx
PDF
Scalable reputation systems for peer-to-peer networks
PDF
PDF
PDF
PDF