Search for "CAGE" returned 2841 results
58 min
Operation Triangulation
What You Get When Attack iPhones of Researchers
56 min
Rock' em Graphic Cards
Introduction to Heterogeneous Parallel Programming
58 min
How risky is the software you use?
CITL: Quantitative, Comparable Software Risk Reporting
62 min
Getting software right with properties, generated tests, and proofs
Evolve your hack into robust software!
59 min
Election Cybersecurity Progress Report
Will the U.S. be ready for 2020?
59 min
Provable Security
How I learned to stop worrying and love the backdoor
63 min
Pushing the frontiers of Information Extraction:
A Strategy for for Identifying Calls for Action in Texts…
54 min
How medicine discovered sex
Introduction to sex- and gender-sensitive medicine
60 min
Crypto Wars Part II
The Empires Strike Back
49 min
Electromagnetic Threats for Information Security
Ways to Chaos in Digital and Analogue Electronics
40 min
Live, Die, Repeat
The fight against data retention and boundless access to…
59 min