Search for "JO" returned 10499 results

hacking smart phones
73 min

hacking smart phones

expanding the attack surface and then some

Covert channels in TCP/IP: attack and defence
42 min

Covert channels in TCP/IP: attack and defence

Creation and detection of IP steganography for covert…

BBSs and early Internet access in the 1990ies
61 min

BBSs and early Internet access in the 1990ies

Modems, FIDO, Z-Netz, Usenet, UUCP, SLIP and ISDN

Transition Telecom
74 min

Transition Telecom

Telecommunications and networking during energy descent

Forensic Architecture
43 min

Forensic Architecture

Forensic Architecture is an independent research agency…

Deep Learning Blindspots
53 min

Deep Learning Blindspots

Tools for Fooling the "Black Box"