CAT provides Legal Process Services to leading technology companies, start-ups and law firms across the world. With a fast growing team of lawyers and world class facilities, we are meeting ever increasing client needs.
Highly-ordered arrays of parallel carbon nanotubes were grown by pyrolysis of acetylene on cobalt within a hexagonal close-packed nanochannel alumina template at 650 °C. The nanotubes are characterized by a narrow size distribution, large scale periodicity, and high densities. Using this method ordered nanotubes with diameters from 10 nm to several hundred nm and lengths up to 100 µm can be produced. The high level of ordering and uniformity in these arrays is useful for applications i...
The Eclipse Process Framework (EPF) aims at producing a customizable software process enginering framework, with exemplary process content and tools, supporting a broad variety of project types and development styles.
U. Wajid, V. Chepegin, D. Meridou, M. Papadopoulou, and J. Barbosa. Industrial Applications of Holonic and Multi-Agent Systems: 7th International Conference, HoloMAS 2015, Valencia, Spain, volume 9266 of Lecture Notes in Artificial Intelligence, Springer, Cham, (2015)
Rahul, and Sujata. IJIRIS:: International Journal of Innovative Research in Information Security, Volume V (Issue II):
01-12(February 2018)1. https://www.gdatasoftware.com/blog/2017/04/29666-malware-trends-2017 2. http://docs.apwg.org/reports/apwg_trends_report_q4_2016.pdf 3. Neutralizing Windows-Based Malicious Mobile Code, James A. Whittaker, Andres De Vivanco. http://www.zdnet.com/article/linux-botnet-attacks-increase-in-scale/ 4. Malicious Spam Emails Developments and Authorship attribution, Mamoun Alazab,Robert Layton ,Fourth Cybercrime and Trustworthy Computing Workshop,2013. 5. WatchGuard Technologies : http://www.reputationauthority.org/ 6. AHEAD: A New Architecture for Active Defense,Fabio De Gaspari,Sushil Jajodia, 7. A Practical Business Security Framework to Combat Malware Threat ,P.R.Lakshmi Eswari,N.Sarat Chandra Babu,World Congress on Internet Security,2012 http://voorloopnul.com/blog/a-python-netstat-in-less-than-100-lines-of-code/ 8. Cyber Resilience for Mission Assurance , Harriet Goldman, Rosalie McQuaid, Jeffrey Picciotto https://www.digitalocean.com/community/tutorials/iptables-essentials-common-firewall-rules-and-commands https://www.python.org/ 9. https://rickypc.github.io/robotframework-imaplibrary/doc/ImapLibrary.html 10. www.urlvoid.com 11. www.virustotal.com.
M. Atzmueller, A. Schmidt, B. Kloepper, and D. Arnu. New Frontiers in Mining Complex Patterns. Postproceedings NFMCP 2016, volume 10312 of LNAI, Berlin/Heidelberg, Germany, Springer Verlag, (2017)
M. Kapur, J. Voiklis, and C. Kinzer. Computer-supported collaborative learning 2005: The next 10 years!, page 252-261. Mahwah, NJ, Lawrence Erlbaum, (2005)