×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [acm workshop]
Curriculum Vitae Stephen M. Pizer September 1997.doc.doc.doc.doc
945 views
© 2005 Ravi Sandhu Role Usage and Activation Hierarchies (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security
217 views
PhishZoo: Detecting Phishing Websites By Looking at Them Sadia Afroz Rachel Greenstadt
216 views
An Introduction to Issues Regarding Data Integrity & Virtual Machine Security
221 views
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage Hierarchical Clustering
142 views
rbacDSL - slides from Code Generation 2014
331 views
Deepthi ratnayake
351 views
Software Testing: Introduction
334 views
Situation based analysis and control for supporting Event-web applications
1.368 views
From Events to Situations: An Event-web perspective
893 views
HathiTrust Research Center Data Capsule Overview 09.10.14
250 views
Approximating Attack Surfaces with Stack Traces [ICSE 15]
64 views
Next >