Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
2,576 results
This 28-minute video introduces the concept of the data analysis workflow. The focus of this video is social science research that ...
1,545 views
3 years ago
You are interested in wireless hacking but have no idea where to start? In this talk you will learn about the current state of ...
6,413 views
A look into the ongoing work behind the scenes to further improve the Vala developer experience, from work on the Vala ...
1,341 views
Co-founder of NEAR Protocol, Illia Polosukhin, lays out his vision of the internet of the future and explains how NEAR could take a ...
6,833 views
2 years ago
The recent research in malware analysis suggests state actors allegedly use cyber espionage campaigns against GSM networks.
2,290 views
8 years ago
We will show how its possible to extract data on all subscriptions available on the server using a ruby script, which basically gives ...
10,234 views
7 years ago
In this video, Prof. Aggelos Kiayias explains the research behind Ouroboros, the blockchain protocol underpinning Cardano, a top ...
33,919 views
6 years ago
Ouroboros Genesis - New research for Cardano We're very proud to announce Ouroboros Genesis, a new paper from the IOHK ...
32,052 views
As the majority of malware contains networking capabilities, it is well understood that detecting unauthorized network access is a ...
1,043 views
9 months ago
Tara is the co-creator of the Beaker Browser, a browser for exploring and building the peer-to-peer Web. She's part of Blue Link ...
2,210 views
5 years ago
... in the UK, where he performs vulnerability discovery, exploit development, bespoke protocol analysis and reverse engineering.
2,936 views
Linux Programming & Scripting by Anand Iyer,Director, Calypto Design Systems.For more details on NPTEL visit http://nptel.ac.in.
7,227 views
9 years ago
This video is part of the Microbiome Bioinformatics with QIIME 2: free online workshop! Release schedule and other information ...
4,568 views
Abstract: Dr. Virginia Tucker will present highlights from her research into the transformative learning experiences and critical ...
2,391 views
10 years ago
van der Meer, Lucas; Abad, Lorena; Gilardi, Andrea; Lovelace, Robin Tidy Geospatial Networks in R ...
797 views
In this Palo Alto Networks Training Video, we will show the Threat Prevention Techniques of the Palo Alto Networks ...
6,888 views
Bitcoin isn't too hard to learn, if you've got a great teacher. That's why you want to learn from the best, Andreas! In this video you'll ...
318,034 views
4 years ago
Developing a secure proof of stake algorithm is one of the big challenges in cryptocurrency. The Ouroboros protocol has the ...
18,521 views
Moderator: Neal Haddaway Title: A meta-analysis of preclinical studies with complex data structure: a practical example of using a ...
395 views
1 year ago
Bluetooth Low Energy (BLE) has seen widespread product adoption and a renewed interest from a security community whose ...