Attack model

Results: 101



#Item
91

CAL FIRE Engine - Model 17 USE The Model 17s are assigned in those urban interface areas with difficult access and some fullservice needs. Compact over all, size is maintained with good mobile attack performance. Current

Add to Reading List

Source URL: calfire.ca.gov

- Date: 2013-04-05 13:49:10
    92Logic / Computer security / Digital forensics / Graph theory / Computer network security / Network forensics / Graph / Datalog / Vulnerability / Computing / Artificial intelligence / Reasoning

    A Model Towards Using Evidence From Security Events For Network Attack Analysis Changwei Liu 1, Anoop Singhal 2, Duminda Wijesekera[removed]

    Add to Reading List

    Source URL: www.nist.gov

    Language: English - Date: 2014-05-27 12:38:48
    93Computer security / Crime prevention / National security / Software testing / Vulnerability / Security service / Attack / Information security / Computer network security / Cyberwarfare / Security

    Corey D. Schou, PhD University Professor of Informatics Idaho State University  Engineering and Strength  A Simple Model

    Add to Reading List

    Source URL: www.ieeeusa.org

    Language: English - Date: 2010-04-15 09:10:00
    94Financial crisis / Currency crisis / Economic model / Euro / Speculative attack / Asian financial crisis / Multinomial logit / Logit / Multinomial / Economics / Financial crises / Financial contagion

    PDF Document

    Add to Reading List

    Source URL: www.ecb.europa.eu

    Language: English - Date: 2003-11-28 10:20:02
    95Convertibles / Culture of Detroit /  Michigan / Ford Model T / Known-plaintext attack / Tin Lizzies / Transport / Private transport / Land transport

    The Buzz The official publication of The Dairyland Tin Lizzies January - February 2006 Volume 5 Number 4

    Add to Reading List

    Source URL: clubs.hemmings.com

    Language: English - Date: 2012-03-01 03:02:48
    96Internet standards / Key management / Cryptographic protocols / Network Time Protocol / Time server / Public-key cryptography / Man-in-the-middle attack / Key / One-time password / Cryptography / Computing / Internet protocols

    Cryptographic Authentication for Real-Time Network Protocols1,2 David L. Mills3 Abstract This paper describes a new security model and authentication scheme for distributed, real-time network protocols used in time synch

    Add to Reading List

    Source URL: www.eecis.udel.edu

    Language: English - Date: 1998-12-02 17:00:16
    97Aviation / Israel / Israeli Air Force / Operation Opera / Nuclear proliferation / Preventive war / Military / International relations / War / Airstrikes / Arab–Israeli conflict

    Israel's Attack on Osiraq: A Model for Future Preventive Strikes?

    Add to Reading List

    Source URL: www.fas.org

    Language: English - Date: 2005-04-06 01:02:30
    98Fluid mechanics / Propeller / Airfoil / Lift / Angle of attack / Advance ratio / Foil / Wind tunnel / Downwash / Aerodynamics / Aerospace engineering / Fluid dynamics

    DEVELOPMENT OF A CYCLOIDAL PROPULSION COMPUTER MODEL AND COMPARISON WITH EXPERIMENT

    Add to Reading List

    Source URL: sun.library.msstate.edu

    Language: English - Date: 2008-08-04 04:19:19
    99Financial crisis / Financial Fragility / Paul Krugman / Asian financial crisis / Diamond–Dybvig model / Late-2000s financial crisis / Speculative attack / Bank run / Devaluation / Economics / Financial crises / Currency crisis

    PDF Document

    Add to Reading List

    Source URL: web.mit.edu

    Language: English - Date: 1999-01-19 11:07:12
    100Applied mathematics / Quantum information science / Kish cypher / Quantum key distribution / Quantum computer / Key size / Information-theoretic security / Man-in-the-middle attack / Noisy-storage model / Cryptography / Quantum cryptography / Theoretical computer science

    PDF Document

    Add to Reading List

    Source URL: arxiv.org

    Language: English - Date: 2012-06-18 20:01:55
    UPDATE