Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Block-level provenance-based data protection for USB storage devices, enhancing security in sensitive organizations through remote TPM, integrity models, and access control.
Explore the trade-offs between security and consistency in transaction scheduling, with real-world examples and attack demonstrations in information flow control systems.
Explore memory isolation techniques for multithreaded applications, focusing on enforcing least privilege memory views to enhance security and prevent unauthorized access.
Explore differential power analysis, masking techniques, and strong non-interference in cryptographic systems. Learn about probing security and noiseless leakage models.
Explores data reduction techniques for big data security dependency analyses, focusing on expendable dependencies, controlled loss, and domain knowledge to improve efficiency while maintaining accuracy.
Scalable graph-based approach for efficient bug detection in firmware images, improving vulnerability search speed and accuracy for IoT devices.
Explore Android app security, focusing on third-party library detection, fragmentation issues, and vulnerability identification in mobile applications.
Learn techniques for statistically deobfuscating Android apps, including probabilistic graphical models and implementation strategies, to enhance app security and analysis.
Explore Android security vulnerabilities through synchronous callbacks, examining attacks on system servers and apps, and discussing detection methods and defense strategies.
Explore Android Unix domain socket vulnerabilities, their security implications, and mitigation strategies in this comprehensive analysis of potential misuse and authentication weaknesses.
Explore distributed payment systems, mobile money revolution, and the DigiTally project with Ross Anderson. Insights on challenges, field trials, and lessons learned in building truly decentralized financial solutions.
Martin Hellman explores cybersecurity, nuclear security, and logical paradoxes, drawing connections between cryptography, national security, and mathematical logic while reflecting on his career and the broader implications of technology.
Explore how technology solutions must be adapted for Africa's unique context, focusing on smartphone-first users and the potential for innovation to address local challenges and impact lives.
Explore the human factor in cybersecurity through encounters with hackers and pentesters. Learn why understanding attacker motivations is crucial for developing effective defenses beyond usable security.
Learn to design conference web programs using QOALA and Progressive Web App, covering settings, scheduling, content management, and export features.
Get personalized course recommendations, track subjects and courses with reminders, and more.