Active
Recent
Comments
Search
Login
Login
ieeexplore.ieee.org: 24 stories from 17 submitters
7
Safer Linux Kernel Modules Using the D Programming Language
d
linux
ieeexplore.ieee.org
via
jmiven
10 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
8 comments
8
-1
On the generation of high-quality random numbers by two-dimensional cellular automata
cryptography
programming
ieeexplore.ieee.org
via
LenFalken
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
4
Weird Machines, Exploitability, and Provable Unexploitability
security
ieeexplore.ieee.org
via
df
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
How Fast Do Algorithms Improve?
performance
ieeexplore.ieee.org
via
fernplus
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
3
Evolution of the Unix System Architecture: An Exploratory Case Study
☶
pdf
unix
ieeexplore.ieee.org
via
dbremner
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Evolution of the Unix System Architecture: An Exploratory Case Study
freebsd
unix
ieeexplore.ieee.org
via
nixcraft
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
7
Evolution of the Unix System Architecture: An Exploratory Case Study
historical
unix
ieeexplore.ieee.org
via
GeoffWozniak
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
A Review of Physics Simulators for Robotic Applications
ai
ieeexplore.ieee.org
via
friendlysock
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
8
Reverse Engineering of Intel Microcode Update Structure
reversing
ieeexplore.ieee.org
via
calvin
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
The Origin of the “MIT License”
historical
law
ieeexplore.ieee.org
via
j11g
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
A CFI Countermeasure Against GOT Overwrite Attacks
pdf
security
ieeexplore.ieee.org
via
fro
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
The LISP 2 Project
☶
historical
ieeexplore.ieee.org
via
GeoffWozniak
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
A Survey of Research on Runtime Rerandomization Under Memory Disclosure
pdf
security
ieeexplore.ieee.org
via
fro
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
DOPdefenderPlus: A Data-Oriented Programming Attack Mitigation Technique for Complex Software
pdf
security
ieeexplore.ieee.org
via
fro
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Leakage Is Prohibited: Memory Protection Extensions Protected Address Space Randomization
pdf
security
ieeexplore.ieee.org
via
fro
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
HW-CDI: Hard-Wired Control Data Integrity
pdf
security
ieeexplore.ieee.org
via
fro
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
BoundShield: Comprehensive Mitigation for Memory Disclosure Attacks via Secret Region Isolation
pdf
security
ieeexplore.ieee.org
via
fro
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
10
The First Public Discussion of the Secret Colossus Project
☶
pdf
historical
ieeexplore.ieee.org
via
mjn
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game
practices
security
ieeexplore.ieee.org
via
cleong
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
3
Weird machines, exploitability, and provable unexploitability
☶
compsci
security
ieeexplore.ieee.org
via
koomi
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
PAPAC-00, a Do-It-Yourself Paper Computer
pdf
compsci
hardware
ieeexplore.ieee.org
via
friendlysock
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Resurrecting the CDC 6500 Supercomputer
☶
hardware
historical
ieeexplore.ieee.org
via
friendlysock
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Geometric Algebra for Electrical and Electronic Engineers
pdf
hardware
math
ieeexplore.ieee.org
via
pushcx
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
Maxwell's Equations expressed as a single equation, via Clifford's geometric algebra
☶
pdf
math
ieeexplore.ieee.org
via
zem
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0