Terri Oda
Terri Oda
Security Researcher, Intel Open Source Security
Adresse e-mail validée de toybox.ca - Page d'accueil
Titre
Citée par
Citée par
Année
Developing an immunity to spam
T Oda, T White
Genetic and Evolutionary Computation Conference, 231-242, 2003
1012003
SOMA: Mutual approval for included content in web pages
T Oda, G Wurster, PC van Oorschot, A Somayaji
Proceedings of the 15th ACM conference on Computer and communications …, 2008
912008
Immunity from Spam: An Analysis of an Artificial Immune System for Junk Email Detection
T Oda, T White
Lecture Notes in Computer Science 3627, 276-289, 2005
812005
Increasing the accuracy of a spam-detecting artificial immune system
T Oda, T White
The 2003 Congress on Evolutionary Computation, 2003. CEC'03. 1, 390-396, 2003
662003
Revisiting elitism in ant colony optimization
T White, S Kaegi, T Oda
Genetic and Evolutionary Computation Conference, 122-133, 2003
292003
A spam-detecting artificial immune system
T Oda
Carleton University, 2005
162005
Spam detection using an artificial immune system
T Oda, T White
ACM Crossroads Magazine, Winter, 2004
8*2004
Enhancing Web Page Security with Security Style Sheets
T Oda, A Somayaji
Carleton University, 2011
72011
Simple Security Policy for the Web
T Oda
Carleton University, 2011
22011
Visual security policy for the web
T Oda, A Somayaji
Proceedings of the 5th USENIX conference on Hot topics in security, 1-8, 2010
22010
No web site left behind: Are we making web security only for the elite
T Oda, A Somayaji
Web 2.0 Security and Privacy (W2SP), 2010
22010
Content provider conflict on the modern web
T Oda, A Somayaji, T White
3rd Annual Symposium on Information Assurance (ASIA’08), 2, 2008
12008
GNU Mailman-List Member Manual
T Oda
Last accessed August 5th, 2004
12004
Python Security Tools
T Oda
PyCon US 2019, 2019
2019
Choosing Secure Open Source Packages - Part 1
T Oda
https://01.org/blogs/terrioda/2017/choosing-secure-open-source-packages-part-1, 2017
2017
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–15