Post a Project

RedPel

Subtitle

JAVA - SECURE COMPUTING

 
Sort: Recent | Popular Grid List
Packet-Hiding Methods for Preventing Sel...
by RedPel on February 18, 2015 at 3:11 AM
668 Views - 0 Comments

The Devils Behind Web Application Vulner...
by RedPel on February 18, 2015 at 3:28 AM
627 Views - 0 Comments

Security Architecture for Cloud Networki...
by RedPel on February 18, 2015 at 3:25 AM
625 Views - 0 Comments

Online Modeling of Proactive Moderation ...
by RedPel on February 18, 2015 at 3:09 AM
622 Views - 0 Comments

pCloud: A Distributed System for Practic...
by RedPel on February 18, 2015 at 3:13 AM
615 Views - 0 Comments

Fast and accurate annotation of short te...
by RedPel on February 18, 2015 at 3:08 AM
614 Views - 0 Comments

Ensuring Distributed Accountability for ...
by RedPel on February 18, 2015 at 3:03 AM
611 Views - 0 Comments

FADE: Secure Overlay Cloud Storage with ...
by RedPel on February 18, 2015 at 3:04 AM
597 Views - 0 Comments

Detecting Spam Zombies by Monitoring Ou...
by RedPel on February 18, 2015 at 2:54 AM
587 Views - 0 Comments

Secure Overlay Cloud Storage with Access...
by RedPel on February 18, 2015 at 3:21 AM
582 Views - 0 Comments

A Learning-Based Approach to Reactive Se...
by RedPel on February 18, 2015 at 2:40 AM
575 Views - 0 Comments

Risk-Aware Mitigation for MANET Routing ...
by RedPel on February 18, 2015 at 3:20 AM
575 Views - 0 Comments


1 - 12 of 25 Videos