×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [target victim]
Post Metasploitation
4.383 views
Ira Wilsker's January 2014 Identity Theft Presentation
870 views
The Experiences of a Cyber Attack Victim
118 views
Anonymity for Continuous Data Publishing Benjamin C. M. Fung Concordia University Montreal, QC, Canada fung Ke Wang Simon
217 views
Terrorist Targeting, Information, and Coalition Behavior Maurice Koster Ines Lindner Gordon McCormick Guillermo Owen
218 views
Hey You, Get Off My Cloud: Exploring information Leakage in third party compute clouds T.Ristenpart, Eran Tromer, Hovav Shacham and Steven Savage ACM CCS
221 views
Anonymizing Location-based data Jarmanjit Singh Jar_sing(at)encs.concordia.ca Harpreet Sandhu h_san(at)encs.concordia.ca Qing Shi q_shi(at)encs.concordia.ca
215 views
Hey You, Get Off My Cloud: Exploring information Leakage in third party compute clouds
46 views
Anonymity for Continuous Data Publishing
42 views