Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Computer Science
Cybersecurity
Max MSP Programming Course: Structuring Interactive Software for Digital Arts
Fundamentals of Neuroscience, Part 1: The Electrical Properties of the Neuron
Psychology of Personal Growth
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the development of a dog-controlled video call device, examining implications for animal-computer interaction and the potential for an animal-centric internet.
Innovative acoustic-based signature verification system using smartphones. Captures dynamic handwriting patterns with inaudible signals, achieving high accuracy through multi-modal data fusion and attentional Siamese network.
Explore Smalltalk programming language through a vintage video from SIGGRAPH '83, showcasing its innovative object-oriented concepts and graphical user interface.
Explore the principles of effective recommendations with expert Joseph Konstan. Learn how recommendation technologies can be designed to benefit users, drawing from 24 years of research and industry insights.
Comprehensive introduction to cryptographic currencies, covering fundamental concepts, blockchain technology, and security implications in digital finance.
Explore adversarial data mining techniques in cybersecurity, focusing on big data challenges and solutions for detecting and mitigating threats in complex digital environments.
Explore transparency overlays and their applications in computer security, focusing on innovative research by Chase and Meiklejohn presented at the ACM CCS 2016 conference.
Explore privacy and security challenges in genomics with experts Erman Ayday and Jean-Pierre Hubaux, addressing crucial issues in the era of widespread genetic data use and sharing.
Explore innovative techniques for bypassing internet censorship using Content Delivery Networks, presented by researchers from UMass Amherst at a major cybersecurity conference.
Explore a novel decoy routing technique for censorship circumvention, featuring traffic replacement to perfectly imitate overt destinations and enhance user privacy.
Explore techniques to prevent information leakage in multi-user MIMO networks, focusing on downlink training sequences and their security implications for wireless communications.
Explore security threats of dangling DNS records, understanding vulnerabilities and potential exploits in domain name systems.
Innovative IPsec gateway implementation on embedded APUs, enhancing network security performance through efficient hardware utilization and optimized cryptographic operations.
Explore coverage-based greybox fuzzing as a Markov chain process, enhancing software testing efficiency and vulnerability detection in computer security applications.
Explore credit networks, their applications, and security implications in distributed systems. Learn from expert Aniket Kate about this emerging concept in computer science.
Get personalized course recommendations, track subjects and courses with reminders, and more.