Cisco Secure X
Aviation Electronics Glosary
asa_83_cli_cfg
How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks
Threat Detection and Incident Response: What's New for 2014
Data Mining and Knowledge Discovery in Business Databases
CRB Examples
Elspeth McAdam STOK Conference. 13th November 2009, Denmark LOVE.
STING: Spatio-Temporal Interaction Networks and Graphs for Intel Platforms
ICASSP 2012: Analysis of Streaming Social Networks and Graphs on Multicore Architectures
SIAM Annual Meeting 2012: Streaming Graph Analytics for Massive Graphs