Zobrazeno 1 - 10
of 35
pro vyhledávání: '"Richard III, Golden G."'
Autor:
Barone IV, Charles R., Serafin, Robert, Shavrov, Ilya, Baggili, Ibrahim, Ali-Gombe, Aisha, Richard III, Golden G., Case, Andrew
This paper presents the results of a needs analysis survey for Reverse Engineering (RE). The need for reverse engineers in digital forensics, continues to grow as malware analysis becomes more complicated. The survey was created to investigate tools
Externí odkaz:
http://arxiv.org/abs/2212.07531
The performance of partially synchronous BFT-based consensus protocols is highly dependent on the primary node. All participant nodes in the network are blocked until they receive a proposal from the primary node to begin the consensus process.Theref
Externí odkaz:
http://arxiv.org/abs/2007.00186
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Richard, III, Golden G.1,2,3 golden@cs.uno.edu, Roussev, Vassil4 Vassil@roussev.net
Publikováno v:
Communications of the ACM. Feb2006, Vol. 49 Issue 2, p76-80. 4p. 1 Diagram.
Publikováno v:
Proceedings of the International Conference on Cyber Warfare & Security; 2022, p423-432, 10p
Publikováno v:
Information Security: 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings; 2015, p3-19, 17p
Publikováno v:
Journal of Cyber Security Technology; October 2017, Vol. 1 Issue: 3-4 p163-174, 12p
Autor:
Adelstein, Frank1 fadelstein@oracorp.com, Richard III, Golden G.2 golden@cs.uno.edu, Schwiebert, Loren3 loren@cs.wayne.edu
Publikováno v:
Computer Communications. Jun2003, Vol. 26 Issue 10, p1105. 24p.
Autor:
Richard III, Golden G., Case, Andrew
Publikováno v:
Digital Investigation; Aug2014 Supplement 2, Vol. 11, pS3-S12, 10p
Publikováno v:
Computer (00189162); Dec2012, Vol. 45 Issue 12, p44-51, 8p