Mobile networks: exploiting HTTP headers and data traffic - DefCamp 2012
Dwyer ISSA Presentation
Some Design Pattern in .NET C#
Fambit user value
There's an App for That: Digital Forensic Realities for Mobile App Evidence, Security and Privacy
OCEAN: Open-source Collation of eGovernment data And Networks: Understanding Privacy Leaks in Open Government Data
Catherine Dwyer, PhD. Seidenberg School of Computer Science & Information Systems Pace University.
Georgios Kontaxis, Michalis Polychronakis Angelos D. Keromytis, Evangelos P. Markatos Siddhant Ujjain (2009cs10219) Deepak Sharma (2009cs10185)
S ECURITY AND P RIVACY OF M OBILE A PPS Fred McMahan.
Turning Privacy Leaks into Floods: Surreptitious Discovery of Social Network Friendships Michael T. Goodrich Univ. of California, Irvine joint w/ Arthur.
Summer 2007CISC121 - Prof. McLeod1 CISC121 – Lecture 5 Last time: –Method Overloading –Arrays –A few useful classes in Java: System Wrapper classes String.
Turning Privacy Leaks into Floods : Surreptitious Discovery of Social Network Friendships