Computer Viruses
Microsoft SQL Server - Intel Processors and Microsoft Power Pivot Presentation
Software Assurance Software Assurance
ASFWS 2011 : Code obfuscation: Quid Novi ?
Wave Systems Corp. Brochure
Physical Unclonable Functions and Applications Srini Devadas Contributors: Dwaine Clarke, Blaise Gassend, Daihyun Lim, Jaewook Lee, Marten van Dijk.
Hardware Security: Trusted Platform Module Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources.
Mind the Gap: Updating FIPS 140 Steve Weingart Futurex 864 Old Boerne Rd. Bulverde, TX 78163 [email protected] Steve R. White IBM Thomas J. Watson Research.
Personalized Cybersecurity for Dummies Jaime G. Carbonell Eugene Fink Mehrbod Sharifi Application of machine learning and crowdsourcing to adapt cybersecurity.
Protecting Data on Smartphones and Tablets from Memory Attacks Presenter: Luren Wang.
DRM: Technology overview Keunwoo Lee CSE 590 SO 19 April 2005.
Pervasive Self-Regeneration through Concurrent Model-Based Execution