university university lecture japanese lecture computer network xen automated reasoning secure os hypervisor security information security udp cloud computing live migration lan tcp google earth p2p p2p network monitoring hadoop dll injection transport control protocol arq osi network model subnetmask ip dht wan multicast sip igmp rtp ip fragmentation nat ip telephony sdn distributed hash table ip routing openflow gf flip flop state machine fec datagram stream pacsec mapreduce dht crawler kademlia theorem priver knuth bendix mws malware analysis automated reasoing polymoprhic code assembly code machine learning network intrusion detection classification clustering non-linear e!kit trusted domain enforcement access control embedded linux windows os log analysis java script aurora opeartion debugging internet explorer error detection and correction ofdm osi model wireless networks dns version open resolver grehack2013 libevent dns active monitoring mist2012 data sovereignty data leakage insider threat vanish configuration analysis open source vulnerability (computing) dht network crawling nosql network visualization passive monitor dx saas vulerability detection lalr parsing source code checking cve-2013-4371 realloc() vulnerability headless browser navigation scripting apk memcached sasl rc4 distributed liar paradox theorem prover automated reasonin event notification rapid crawling cache poisoning asynchrnous i/o ipmi dns cache cache modulation cdma psk qam fm am dns pop ospf lsa rip smtp bgp icmp windows filter driver windows ファイルシステム secure access file system manager visualization vm instrospection xen. kvm. windows device driver p2p network vm monitoring memento kvm windows device driver email snmp dhcp memcached proxy lecture
See more