Post a Project

RedPel

Subtitle

JAVA - SECURE COMPUTING

 
Sort: Recent | Popular Grid List
SAT: A Security Architecture Achieving A...
by RedPel on February 18, 2015 at 3:01 AM
468 Views - 0 Comments

RITAS: Services for Randomized Intrusio...
by RedPel on February 18, 2015 at 2:59 AM
497 Views - 0 Comments

DoubleGuard: Detecting Intrusions In Mul...
by RedPel on February 18, 2015 at 2:58 AM
539 Views - 0 Comments

Direct and Indirect Discrimination Preve...
by RedPel on February 18, 2015 at 2:57 AM
558 Views - 0 Comments

PriPAYD - Privacy Friendly Pay as You Dr...
by RedPel on February 18, 2015 at 2:55 AM
574 Views - 0 Comments

Detecting Spam Zombies by Monitoring Ou...
by RedPel on February 18, 2015 at 2:54 AM
586 Views - 0 Comments

Nymble: Blocking Misbehaving Users in ...
by RedPel on February 18, 2015 at 2:52 AM
534 Views - 0 Comments

Modeling and Detection of Camoufl...
by RedPel on February 18, 2015 at 2:49 AM
532 Views - 0 Comments

Data-Provenance Verification For S...
by RedPel on February 18, 2015 at 2:47 AM
530 Views - 0 Comments

Coding for Cryptographic Security Enhanc...
by RedPel on February 18, 2015 at 2:46 AM
522 Views - 0 Comments

Anomaly Detection via Online Over-Sampl...
by RedPel on February 18, 2015 at 2:44 AM
522 Views - 0 Comments

A Distributed Algorithm for Finding All ...
by RedPel on February 18, 2015 at 2:42 AM
504 Views - 0 Comments


13 - 24 of 25 Videos