Browse
Contact
/
Login
Upload
Search Results for 'Data Detection'
Rootkit and Kernel Integrity Protection
phoebe-click
How Not to Have Your Research Stolen or Corrupted
tatiana-dople
How Not to Have Your Research Stolen or Corrupted
olivia-moreira
a near
yoshiko-marsland
Location based detection of replication attacks and colludeva attacks
conchita-marotz
Aviation Fuel System Leak Detection
celsa-spraggs
Midterm Presentation
olivia-moreira
Catch Me If You Can: Detecting Pickpocket Suspects from
calandra-battersby
Using Data Mining in the Identification of Compromised Sens
briana-ranney
Multi-Local Feature Manifolds for Object Detection
min-jolicoeur
Aviation Fuel System Leak Detection
trish-goza
IN-LINE VISUAL ANALYSIS OF
lindy-dunigan
Application 2: Misstatement detection
natalia-silvester
On Survivability of Mobile Cyber Physical Systems
min-jolicoeur
Grade Projections
stefany-barnette
The Viola/Jones Face Detector
lois-ondreau
Detecting attacks
pamella-moone
Generic Object Detection using Feature Maps
yoshiko-marsland
Role of layer 4 of Auditory Cortex in Gap Detection
briana-ranney
Real-time Corrosion Product Transport Monitoring Using
test
SUSPICIOUS ACTIVITY DETECTION
conchita-marotz
Web Application Vulnerabilities, Detection Mechanisms, and
liane-varnes
Data Representation in
alexa-scheidler
Data Representation
celsa-spraggs
15
16
17
18
19
20
21
22
23
24
25