and Security

Results: 171768



#Item
21Software / Computing / Antivirus software / Security breaches / Proprietary software / Malware / Kaspersky Lab / Google Chrome / Internet Explorer

Poster: Detecting WebInjects through Live Memory Inspection Nicola Mariani∗ , Andrea Continella∗ , Marcello Pogliani∗ , Michele Carminati∗ , Federico Maggi∗† , and Stefano Zanero∗ ∗ Dipartimento

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-02 20:58:16
22Cybercrime / Computer security / Cyberwarfare / Security engineering / Computer network security / Cyberspace / National security / Denial-of-service attack / Cyberattack / Network security

CALL FOR PAPERS Special Issue of the International Journal on Network Management (IJNM) on Measure, Detect and Mitigate – Challenges and Trends in Network Security Publication: September 2015

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2014-09-02 00:52:00
23Stock market / Finance / Initial public offering / 73rd United States Congress / U.S. Securities and Exchange Commission / Prospectus / Securities Act / Initial coin offering / Security / Money / Economy

BUILDING A REGULATED INVESTMENT PLATFORM AND SECURITY TOKEN EXCHANGE FOR START-UPS AND SMEs Q4 2018 Disclaimer

Add to Reading List

Source URL: www.kambio.io

Language: English - Date: 2018-10-18 01:47:00
24Computing / Cyberwarfare / Computer security / Cryptography / Cybercrime / Computer network security / Backdoor / Rootkits / Google Play / Android / Firebase / Password

Poster: Design of Backdoor on Android Devices Junsung Cho, Geumhwan Cho, Sangwon Hyun and Hyoungshick Kim Department of Computer Science and Engineering, Sungkyunkwan University, Republic of Korea Email: {js.cho, geumhwa

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 08:11:56
25Terms of service / Identity management / Law / Privacy / Internet privacy / Attitude / Social psychology / Medical privacy / Psychology / Behavior

Poster: Why Privacy is All But Forgotten An Empirical Study of Privacy & Sharing Attitude Kovila P.L. Coopamootoo and Thomas Groß I. I NTRODUCTION Privacy and sharing are believed to share a dynamic and

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 16:46:26
26Security engineering / LinkedIn / Recruitment / Social media / Computer security / Security / Cyberspace

Business Services (en) IT-Security Vendors / System Integrators German-speaking Content Creation Marketing Services - Infopoint Security combines Marketing and PR duties. Get more visbility in the German-speaking DACH-ma

Add to Reading List

Source URL: www.infopoint-security.de

Language: English - Date: 2018-04-17 01:50:55
27Laboratories / Medical diagnosis / Medical laboratory / Nuclear history of the United States / Presidency of Jimmy Carter / Radiation Control for Health and Safety Act / Draft:Anti-Corruption and Public Integrity Act

§ 263 TITLE 42—THE PUBLIC HEALTH AND WELFARE (iv) provides for comprehensive and effective Federal oversight of BSAT security; and

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2018-04-26 06:22:01
28

2015 IEEE Symposium on Security and Privacy Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs Eli Ben-Sasson§ , Alessandro Chiesa∗ , Matthew Green† , Eran Tromer¶ , Madars Virza‡ ∗ ETH

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:13
    29Coordinated Annual Review on Defence / Military of the European Union / Permanent Structured Cooperation / Common Security and Defence Policy / European Medical Command / World / Enhanced cooperation / European External Action Service / European Defence Agency / European Union Military Staff / European Union / Europe

    Permanent Structured Cooperation - PESCO Deepening Defence Cooperation among EU Member States More security for the EU and its citizens In light of a changing security

    Add to Reading List

    Source URL: eeas.europa.eu

    Language: English - Date: 2018-03-09 12:36:49
    30Computer security / Cybercrime / Cyberwarfare / Computer network security / Security engineering / Computing / National security / Deception technology / Cyberattack / Intrusion detection system / Botnet / Denial-of-service attack

    Poster: A Website Protection Framework Against Targeted Attacks based on Cyber Deception Jianbao Lin*, Chaoge Liu†, Xiang Cui*†‡, Zhaopeng Jia* * Beijing University of Posts and Telecommunications, Beijing, China

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-15 12:53:26
    UPDATE