×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [computer security esorics]
13940305-Privacy & Security_ver1.15
23 views
Benjamin Johnson Carnegie Mellon University Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information TRUST
220 views
Automatically Generating Models for Botnet Detection Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel, Engin Kirda Vienna University
220 views
Fully Secure Multi-authority Ciphertext -Policy Attribute-Based Encryption without Random Oracles
117 views