Attack model

Results: 101



#Item
31Block cipher / Hash function / One-way compression function / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Collision attack

A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions Donghoon Chang Center for Information Security Technologies(CI

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-21 12:10:24
32Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Routing algorithms / Computing / Network topology / Traffic generation model / Routing / Flooding / Computer network security / Denial-of-service attacks / Network architecture

Automating DDoS Experimentation Jelena Mirkovic University of Delaware Newark, DE Sonia Fahmy Purdue University

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2007-08-30 19:36:27
33Cryptographic protocols / Secure communication / HTTP / HTTP Secure / Certificate authority / Public key certificate / Client–server model / Transport Layer Security / FTPS / Cryptography / Key management / Public-key cryptography

Securing Web Servers against Insider Attack Shan Jiang Sean Smith Kazuhiro Minami

Add to Reading List

Source URL: systemsresilience.org

Language: English - Date: 2013-01-05 00:32:19
34Cyberwarfare / Videotelephony / Computer network security / Malware / Stuxnet / Targeted threat / Denial-of-service attack / Social engineering / Voice over IP / Software / Computing / System software

The Slingshot Project Measuring, analyzing, and defending against targeted attacks Stevens Le Blond Software security model

Add to Reading List

Source URL: www.dfn-cert.de

Language: English - Date: 2015-03-06 09:40:10
35Data / Internet protocols / Secure communication / Network architecture / Transport Layer Security / Public-key cryptography / IPsec / OSI model / Man-in-the-middle attack / Computing / Cryptographic protocols / Cryptography

IoT Security IoT Security IoT Security

Add to Reading List

Source URL: 1248.io

Language: English - Date: 2014-09-29 14:21:23
36Computing / Firewall / Internet security / Personal firewall / Circuit-level gateway / Application-level gateway / Stateful firewall / TCP/IP model / Denial-of-service attack / Computer network security / Computer security / Cyberwarfare

Firewall Q&A The Internet has made large amounts of information available to the average computer user at home, in business and in education. For many people, having access to this information is no longer just an advant

Add to Reading List

Source URL: www.vicomsoft.com

Language: English - Date: 2011-05-13 11:59:04
37Crime prevention / Public safety / Cybernetics / Systems theory / Viable system model / Staff / Computer security / Information security / Entailment / Logic / Security / National security

Information Warfare: Using the Viable System Model as a framework to attack organisations Bill Hutchinson School of Management Information Systems Edith Cowan University Western Australia, 6018

Add to Reading List

Source URL: systemdynamics.org

Language: English - Date: 2009-03-11 16:38:21
38Microsoft / Trustworthy computing / Application security / Firefox / Software bug / Threat model / Michael Howard / Windows XP / Attack Surface Analyzer / Software / Computing / Computer security

Life in the Digital Crosshairs The dawn of the Microsoft Security Development Lifecycle The dawn of Microsoft Trustworthy Computing

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2014-05-20 17:31:10
39Cyberwarfare / Computer network security / Crime prevention / National security / Information security / Security controls / Vulnerability / Security awareness / Attack / Computer security / Security / Data security

NB model policy on reporting information security incidents

Add to Reading List

Source URL: www.noticebored.com

Language: English - Date: 2015-03-21 00:21:29
40Wildfire / Bushfires in Australia / Ionizing radiation / Thermal radiation / Ember attack / Flame / AS3959 / Fire / Heat transfer / Combustion

A Computerised Model for Bushfire Attack Assessment and Its Applications in Bushfire Protection Planning

Add to Reading List

Source URL: www.mssanz.org.au

Language: English - Date: 2013-01-15 18:58:00
UPDATE