Search Materials
Sort materials by
Search Materials
Get more information on the MERLOT Editors' Choice Award in a new window.
Get more information on the MERLOT Classics Award in a new window.
Get more information on the JOLT Award in a new window.
Go to Search Page
Go to Partner Benefits
View material results for all disciplines
Please enter a Bookmark title
Please limit Bookmark title to 65 characters
Please enter a description
Please limit Bookmark title to 4000 characters
Please limit a note about this material to 2048 characters
A Bookmark with this title already existed.
Search all MERLOT
Select to go to your profile
Select to go to your workspace
Select to go to your Dashboard Report
Select to go to your Content Builder
Select to log out
Search Terms
Enter username
Enter password
Please give at least one keyword of at least three characters for the search to work with. The more keywords you give, the better the search will work for you.
Select OK to launch help window
Cancel help

MERLOT II

Advanced Search





    

Refine Your Search:

 
Materials 1 - 10 shown of 12 results

Introduction to Cryptography

This site provides a brief textual overview of the field of cryptography and related issues including popular techniques,... see more
Material Type: Presentation
Author: RSA Laboratories
Date Added: Aug 25, 2005 Date Modified: Jan 15, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Introduction to Cryptography"
User Rating for material titled "Introduction to Cryptography"
Member Comments for material titled "Introduction to Cryptography"
Bookmark Collections for material titled "Introduction to Cryptography"
Course ePortfolios for material titled "Introduction to Cryptography"
Learning Exercises for material titled "Introduction to Cryptography"
Accessibility Info for material titled "Introduction to Cryptography"
eTextbook Reviews for material titled "Introduction to Cryptography"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review
Very good quality; in queue to be peer reviewed
avg: 5 rating

User review 5 average rating
User Rating 5 user rating
Discussion (1 Comment)
In (1)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Accountability and Deterrence in Online Life

This video was recorded at 3rd International Conference on Web Science. The standard technical approach to privacy and... see more
Material Type: Presentation
Author: Joan Feigenbaum
Date Added: Feb 08, 2015 Date Modified: Feb 08, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Accountability and Deterrence in Online Life"
User Rating for material titled "Accountability and Deterrence in Online Life"
Member Comments for material titled "Accountability and Deterrence in Online Life"
Bookmark Collections for material titled "Accountability and Deterrence in Online Life"
Course ePortfolios for material titled "Accountability and Deterrence in Online Life"
Learning Exercises for material titled "Accountability and Deterrence in Online Life"
Accessibility Info for material titled "Accountability and Deterrence in Online Life"
eTextbook Reviews for material titled "Accountability and Deterrence in Online Life"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

CIA's Kryptos Sculpture

This site provides a photo of the enigmatic Kryptos Sculpture at the CIA Headquarters in Washington, D.C., as well as a link... see more
Material Type: Presentation
Author: U.S. Central Intelligence Agency
Date Added: Aug 25, 2005 Date Modified: Aug 25, 2005
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "CIA's Kryptos Sculpture"
User Rating for material titled "CIA's Kryptos Sculpture"
Member Comments for material titled "CIA's Kryptos Sculpture"
Bookmark Collections for material titled "CIA's Kryptos Sculpture"
Course ePortfolios for material titled "CIA's Kryptos Sculpture"
Learning Exercises for material titled "CIA's Kryptos Sculpture"
Accessibility Info for material titled "CIA's Kryptos Sculpture"
eTextbook Reviews for material titled "CIA's Kryptos Sculpture"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Detection of server side web attacks

This video was recorded at Workshop on Applications of Pattern Analysis (WAPA), Cumberland Lodge 2010. Pattern Analysis and... see more
Material Type: Presentation
Author: Igino Corona
Date Added: Feb 10, 2015 Date Modified: Feb 10, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Detection of server side web attacks"
User Rating for material titled "Detection of server side web attacks"
Member Comments for material titled "Detection of server side web attacks"
Bookmark Collections for material titled "Detection of server side web attacks"
Course ePortfolios for material titled "Detection of server side web attacks"
Learning Exercises for material titled "Detection of server side web attacks"
Accessibility Info for material titled "Detection of server side web attacks"
eTextbook Reviews for material titled "Detection of server side web attacks"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Fifty ways to detect a ghostwriter

This video was recorded at Slovenian KDD Conference on Data Mining and Data Warehouses (SiKDD), Ljubljana 2011. Ghostwriting... see more
Material Type: Presentation
Author: Katerina Zdravkova
Date Added: Feb 10, 2015 Date Modified: Feb 10, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Fifty ways to detect a ghostwriter"
User Rating for material titled "Fifty ways to detect a ghostwriter"
Member Comments for material titled "Fifty ways to detect a ghostwriter"
Bookmark Collections for material titled "Fifty ways to detect a ghostwriter"
Course ePortfolios for material titled "Fifty ways to detect a ghostwriter"
Learning Exercises for material titled "Fifty ways to detect a ghostwriter"
Accessibility Info for material titled "Fifty ways to detect a ghostwriter"
eTextbook Reviews for material titled "Fifty ways to detect a ghostwriter"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

IMDS: Intelligent Malware Detection System

This video was recorded at 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), San Jose... see more
Material Type: Presentation
Author: Yanfang Ye
Date Added: Feb 10, 2015 Date Modified: Feb 10, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "IMDS: Intelligent Malware Detection System"
User Rating for material titled "IMDS: Intelligent Malware Detection System"
Member Comments for material titled "IMDS: Intelligent Malware Detection System"
Bookmark Collections for material titled "IMDS: Intelligent Malware Detection System"
Course ePortfolios for material titled "IMDS: Intelligent Malware Detection System"
Learning Exercises for material titled "IMDS: Intelligent Malware Detection System"
Accessibility Info for material titled "IMDS: Intelligent Malware Detection System"
eTextbook Reviews for material titled "IMDS: Intelligent Malware Detection System"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Parametric Autentication. How I know who you are?

This video was recorded at VideoLectures.NET - Single Lectures Series. The Single Lectures Series is an attempt of the... see more
Material Type: Presentation
Author: Anil K. Jain
Date Added: Feb 08, 2015 Date Modified: Feb 08, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Parametric Autentication. How I know who you are?"
User Rating for material titled "Parametric Autentication. How I know who you are?"
Member Comments for material titled "Parametric Autentication. How I know who you are?"
Bookmark Collections for material titled "Parametric Autentication. How I know who you are?"
Course ePortfolios for material titled "Parametric Autentication. How I know who you are?"
Learning Exercises for material titled "Parametric Autentication. How I know who you are?"
Accessibility Info for material titled "Parametric Autentication. How I know who you are?"
eTextbook Reviews for material titled "Parametric Autentication. How I know who you are?"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Plastic Card Fraud Detection using Peer Group Analysis

This video was recorded at NATO Advanced Study Institute on Mining Massive Data Sets for Security. Fraud detection... see more
Material Type: Presentation
Author: Dave Weston
Date Added: Feb 10, 2015 Date Modified: Feb 10, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Plastic Card Fraud Detection using Peer Group Analysis"
User Rating for material titled "Plastic Card Fraud Detection using Peer Group Analysis"
Member Comments for material titled "Plastic Card Fraud Detection using Peer Group Analysis"
Bookmark Collections for material titled "Plastic Card Fraud Detection using Peer Group Analysis"
Course ePortfolios for material titled "Plastic Card Fraud Detection using Peer Group Analysis"
Learning Exercises for material titled "Plastic Card Fraud Detection using Peer Group Analysis"
Accessibility Info for material titled "Plastic Card Fraud Detection using Peer Group Analysis"
eTextbook Reviews for material titled "Plastic Card Fraud Detection using Peer Group Analysis"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Privilege Management using X.509 Attribute Certificates (upravljanje z digitalnimi pooblastili)

This video was recorded at Solomon seminar. Solomon seminar is a series of open public seminars mainly on Artificial... see more
Material Type: Presentation
Author: David Chadwick
Date Added: Feb 10, 2015 Date Modified: Feb 10, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Privilege Management using X.509 Attribute Certificates (upravljanje z digitalnimi pooblastili)"
User Rating for material titled "Privilege Management using X.509 Attribute Certificates (upravljanje z digitalnimi pooblastili)"
Member Comments for material titled "Privilege Management using X.509 Attribute Certificates (upravljanje z digitalnimi pooblastili)"
Bookmark Collections for material titled "Privilege Management using X.509 Attribute Certificates (upravljanje z digitalnimi pooblastili)"
Course ePortfolios for material titled "Privilege Management using X.509 Attribute Certificates (upravljanje z digitalnimi pooblastili)"
Learning Exercises for material titled "Privilege Management using X.509 Attribute Certificates (upravljanje z digitalnimi pooblastili)"
Accessibility Info for material titled "Privilege Management using X.509 Attribute Certificates (upravljanje z digitalnimi pooblastili)"
eTextbook Reviews for material titled "Privilege Management using X.509 Attribute Certificates (upravljanje z digitalnimi pooblastili)"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Relational Data Pre-Processing Techniques for Improved Securities Fraud Detection

This video was recorded at 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), San Jose... see more
Material Type: Presentation
Author: Andrew Fast
Date Added: Feb 10, 2015 Date Modified: Feb 10, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Relational Data Pre-Processing Techniques for Improved Securities Fraud Detection"
User Rating for material titled "Relational Data Pre-Processing Techniques for Improved Securities Fraud Detection"
Member Comments for material titled "Relational Data Pre-Processing Techniques for Improved Securities Fraud Detection"
Bookmark Collections for material titled "Relational Data Pre-Processing Techniques for Improved Securities Fraud Detection"
Course ePortfolios for material titled "Relational Data Pre-Processing Techniques for Improved Securities Fraud Detection"
Learning Exercises for material titled "Relational Data Pre-Processing Techniques for Improved Securities Fraud Detection"
Accessibility Info for material titled "Relational Data Pre-Processing Techniques for Improved Securities Fraud Detection"
eTextbook Reviews for material titled "Relational Data Pre-Processing Techniques for Improved Securities Fraud Detection"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)
RSS

Results page 1 of 2
2  Next Next Arrow
Jump to page