university lecture japanese lecture university computer network xen automated reasoning information security google earth p2p network monitoring dll injection cloud computing udp tcp p2p lan live migration secure os hypervisor security hadoop dx saas vulerability detection lalr parsing source code checking cve-2013-4371 realloc() vulnerability headless browser navigation scripting apk memcached sasl rc4 distributed liar paradox theorem prover automated reasonin event notification rapid crawling cache poisoning asynchrnous i/o dns version open resolver grehack2013 libevent dns active monitoring mist2012 data sovereignty data leakage insider threat vanish configuration analysis open source vulnerability (computing) dht network crawling nosql network visualization passive monitor windows filter driver windows ファイルシステム secure access file system manager visualization vm instrospection xen. kvm. windows device driver p2p network vm monitoring memento kvm windows device driver email snmp dhcp memcached proxy ipmi dns cache cache modulation cdma psk qam fm am dns pop ospf lsa rip smtp bgp icmp multicast sip igmp rtp ip fragmentation nat ip telephony sdn distributed hash table ip routing openflow gf flip flop state machine fec datagram stream arq transport control protocol osi network model subnetmask ip dht wan lecture wireless networks osi model ofdm error detection and correction internet explorer debugging aurora opeartion java script log analysis windows os embedded linux access control trusted domain enforcement e!kit non-linear clustering classification network intrusion detection machine learning assembly code polymoprhic code automated reasoing malware analysis mws knuth bendix theorem priver kademlia dht crawler mapreduce pacsec
Tout plus