×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [computer security research]
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics Review Boards
1.747 views
Anatomy of hack
952 views
S ev2 c11
20 views
1 The Project of this year Mariano Ceccato FBK - Fondazione Bruno Kessler
[email protected]
219 views
18/03/2007Obfuscation 1 Software protection Mariano Ceccato FBK - Fondazione Bruno Kessler
[email protected]
218 views
Selim Akyokus AIA 2007 12/2/2007 1 AIA 2007 ENHANCED PASSWORD AUTENTICATION THROUGH KEYSTROKE TYPING CHARACTERISTICS Ozlem Guven(1), Selim Akyokus(1),
214 views
CSCD 434/539 Lecture 2 Spring 2014 Computer Security Overview
222 views