Post a Project

RedPel

Subtitle

JAVA - SECURE COMPUTING

 
Sort: Recent | Popular Grid List
SAT: A Security Architecture Achieving A...
by RedPel on February 18, 2015 at 3:01 AM
425 Views - 0 Comments

RITAS: Services for Randomized Intrusio...
by RedPel on February 18, 2015 at 2:59 AM
460 Views - 0 Comments

DoubleGuard: Detecting Intrusions In Mul...
by RedPel on February 18, 2015 at 2:58 AM
503 Views - 0 Comments

Direct and Indirect Discrimination Preve...
by RedPel on February 18, 2015 at 2:57 AM
513 Views - 0 Comments

PriPAYD - Privacy Friendly Pay as You Dr...
by RedPel on February 18, 2015 at 2:55 AM
530 Views - 0 Comments

Detecting Spam Zombies by Monitoring Ou...
by RedPel on February 18, 2015 at 2:54 AM
544 Views - 0 Comments

Nymble: Blocking Misbehaving Users in ...
by RedPel on February 18, 2015 at 2:52 AM
489 Views - 0 Comments

Modeling and Detection of Camoufl...
by RedPel on February 18, 2015 at 2:49 AM
481 Views - 0 Comments

Data-Provenance Verification For S...
by RedPel on February 18, 2015 at 2:47 AM
487 Views - 0 Comments

Coding for Cryptographic Security Enhanc...
by RedPel on February 18, 2015 at 2:46 AM
476 Views - 0 Comments

Anomaly Detection via Online Over-Sampl...
by RedPel on February 18, 2015 at 2:44 AM
482 Views - 0 Comments

A Distributed Algorithm for Finding All ...
by RedPel on February 18, 2015 at 2:42 AM
464 Views - 0 Comments


13 - 24 of 25 Videos