Attack model

Results: 101



#Item
41Inter-process communication / Middleware / Remote procedure call / Server / Client–server model / X Window System / Denial-of-service attack / Software / Computing / System software

The Amoeba Reference Manual Programming Guide AMOEBA

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2000-06-20 03:18:31
42Nurse practitioner / Nursing / Transient ischemic attack / Midwifery / General practitioner / Registry of the Canadian Stroke Network / Stroke recovery / Health / Medicine / Stroke

Microsoft Word - SNP Model Development Report[removed]Final Draft _VCS edi…

Add to Reading List

Source URL: www.health.vic.gov.au

Language: English - Date: 2009-08-22 04:14:16
43Science / Natural disasters / Wildfires / Australia / Black Saturday bushfires / Wildfire / Ember attack / Computer simulation / Numerical weather prediction / Bushfires in Australia / Fire / Computational science

20th International Congress on Modelling and Simulation, Adelaide, Australia, 1–6 December 2013 www.mssanz.org.au/modsim2013 FireDST: Fire Impact and Risk Evaluation Decision Support Tool – model description Ian Fren

Add to Reading List

Source URL: www.mssanz.org.au

Language: English - Date: 2013-11-19 22:00:22
44Combustion / Ember attack / Ember / Black Saturday bushfires / Wildfire / Fire safety / New South Wales Rural Fire Service / House / Fire / Bushfires in Australia / Heat transfer

20th International Congress on Modelling and Simulation, Adelaide, Australia, 1–6 December 2013 www.mssanz.org.au/modsim2013 Building Fire Impact Model Sanabria L.A.a,b, French I.a,b and Cechet R.P.a,b a

Add to Reading List

Source URL: www.mssanz.org.au

Language: English - Date: 2013-11-19 22:00:44
45Fluid mechanics / Stall / Lift-induced drag / Angle of attack / Drag / Lift / Aspect ratio / Airfoil / Camber / Aerodynamics / Aerospace engineering / Fluid dynamics

bat aerodynamic model 1-1 30Jan2012

Add to Reading List

Source URL: www.dpaw.wa.gov.au

Language: English - Date: 2014-05-30 01:46:51
46CHADS2 score / Transient ischemic attack / Registry of the Canadian Stroke Network / Magee Rehabilitation Hospital / Medicine / Stroke / Health

Model of Stroke Care[removed]Neurosciences Health Network 2012

Add to Reading List

Source URL: www.healthnetworks.health.wa.gov.au

Language: English - Date: 2012-05-20 22:16:46
47File sharing networks / Load balancing / Network management / Routing / Client–server model / Denial-of-service attack / SYN flood / Port / Web server / Computing / Denial-of-service attacks / Network performance

Netcalls: End Host Function Calls to Network Traffic Processing Services Justine Sherry Daniel C. Kim Seshadri S. Mahalingam

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2012-07-12 20:27:04
48Computer security / Vulnerability / Threat model / Threat / Security engineering / Countermeasure / Zero-day attack / Reliability engineering / Attack / Cyberwarfare / Computer network security / Security

Three Tenets for Secure Cyber-Physical System Design and Assessment Jeff Hughesa George Cybenkob a Tenet3,

Add to Reading List

Source URL: www.dartmouth.edu

Language: English - Date: 2014-08-11 23:18:16
49Computer security / Science / Complex systems theory / Systems theory / System dynamics / Vulnerability / Economic model / Attack / Social vulnerability / Operations research / Risk / Cyberwarfare

A System Dynamics Model of Information Security Investments

Add to Reading List

Source URL: is2.lse.ac.uk

Language: English
50Search engine optimization / Denial-of-service attack / Computing / Internet / Internet marketing / Luxury

Luxury Link Luxury Link has pioneered the web based auction model for luxury travel Since 1997, luxurylink.com has evolved from an exclusive e-mail list to exclusive online listings. Their audience is extremely savvy, di

Add to Reading List

Source URL: www.cloudflare.com

Language: English - Date: 2015-02-13 18:37:14
UPDATE