Hiding Instructions in a Processor
Luciano Brignone Zhaokun Han Austin Benedetti Muhammad Yasin Jeyavijayan Rajendran License: Creative Commons 2.5
View ArticleHash functions: Properties, an Attack, and an Application
Ranuli Abeysinghe License: Creative Commons 2.5
View ArticleKhaleesi: Breaking The Advertising & Tracking Redirect Chains
Charlie Wolfe Umar Iqbal M. Zubair Shafiq License: Creative Commons 2.5
View ArticleLEADER: Low-Rate Denial-of-Service Attack Defense
Rajat Tandon Haoda Wang Nicolaas Weideman Shushan Arakelyan Christophe Hauser Jelena Mirkovic License: Creative Commons 2.5
View ArticleMore Complete DOM XSS Detection with Dynamic Event Generation
Jonathan Miao Rintaro Fujita William Melicher Michael Stroucken Lujo Bauer Limin Jia License: Creative Commons 2.5
View ArticleNon-malleable Digital Lockers for Efficiently Sampleable Distribution
Peter Fenteany Benjamin Fuller License: Creative Commons 2.5
View ArticleOnline Digital Forensics Courses and Labs for Students and Professionals
Jacob Crain Yier Jin License: Creative Commons 2.5
View ArticlePhysical (PHY) Layer Features for Device Authentication
Bryan Manzi Gian Claude Peter Ekpewoh Timothy Pierson Michel Reece-Kornegay David Kotz License: Creative Commons 2.5
View ArticlePhysical Inspection for PCB Assurance
Jonathan Villanueva Nathan Jessurun Mukhil Azahgan Navid Asadizanjani License: Creative Commons 2.5
View ArticlePromoting Cybersecurity by Design for Software
Morgan Brockman Ying Tang Sameer Patil License: Creative Commons 2.5
View ArticleProtecting Cyber Physical Systems Using A Game-Theoretical Approach
Leander Davis Mina Guirguis License: Creative Commons 2.5
View ArticleReplay Attack Detection in Multimedia of Things (MoT)
Khalid Malik Brandon Kujawa License: Creative Commons 2.5
View ArticleSecure and Scalable Network Packet Processing Using OpenNetVM and mTCP
Dennis Afanasev Timothy Wood Mykola Yurchenko License: Creative Commons 2.5
View ArticleSecure Tensor Processor in the TrustZone
Heejin Park Noah Curran Felix Xiaozhu Lin License: Creative Commons 2.5
View ArticleSnout, an IoT Pentesting-Tool
John Mikulskis Johannes Becker Stefan Gvozdenovic David Starobinski License: Creative Commons 2.5
View ArticleStatic Information Flow Tracking (SIFT) Analysis for Hardware Verification
christie lincoln lisa luo amir uqdah alvin zhang License: Creative Commons 2.5
View ArticleSymbolic Execution for Simple R
Stephen Chong Marco Gaboardi Gian Pietro Farina Laura Zharmukhametova License: Creative Commons 2.5
View ArticleThe Price is (not) Right Comparing Privacy in Free and Paid Apps
Catherine Han Irwin Reyes Alvaro Feal Joel Reardon Narseo Vallina-Rodriguez Serge Egelman License: Creative Commons 2.5
View ArticleThe Susceptibilty of Disclosing Private Security Information in College Students
Rachel Bleiman Aunshul Rege License: Creative Commons 2.5
View ArticleTrustZone as a Secure Tensor Processor
Heejin Park Noah Curran Felix Xiaozhu Lin License: Creative Commons 2.5
View ArticleUsing Deep Learning to Bridge the Semantic Gap between Natural Language and Code
Chris Crabtree Rocky Slavin Xiaoyin Wang Jianwei Niu License: Creative Commons 2.5
View ArticleDr. Celeste Paul talks about Hacking Stress in Cybersecurity Operations
Celeste Lyn Paul is a Senior Researcher at the National Security Agency. Her work focuses on understanding the human factors of cybersecurity. See her recent RSA Conference keynote on Hacking Stress in...
View ArticleCPS: Breakthrough: Secure Interactions with Internet of Things
Kang Shin License: Creative Commons 2.5
View ArticleUnderstanding the Impact of Social and Physical Environment Factors on Crime...
Marc Berman Charlie Catlett Kate Cagney Nicola Ferrier License: Creative Commons 2.5
View ArticleCyber Security booklet for Middle and High School students
The National Cryptologic Foundation Cyber Center for Education and Innovation has just released a great booklet, Outsmart Cyberthreats, on cyber security for Middle and High School students. The...
View ArticleEffective Resource Planning and Disbursement during the COVID-19 Pandemic
Quanyan Zhu Lorna Thorpe Rae Zimmermann License: Creative Commons 2.5
View ArticleNIST Releases Draft Security Feature Recommendations for IoT Devices
NIST Releases Draft Security Feature Recommendations for IoT Devices"Core Baseline" guide offers practical advice for using everyday items that link to computer networks.August 01, 2019read more
View ArticleTIP: Directorate for Technology, Innovation and Partnerships
Government - Free license Carol Bessel License: Other (as defined in the Description section below)
View Article
More Pages to Explore .....