Attack

Results: 9771



#Item
991Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event Abhishek Kumar Georgia Institute of Technology

Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event Abhishek Kumar Georgia Institute of Technology

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:03
992 | www.dnsmadeeasy.com |   IP Anycast+ Enterprise DNS Services MAKING ENTERPRISE DNS SERVICES AN OPTION FOR THE ENTIRE WORLD

| www.dnsmadeeasy.com | IP Anycast+ Enterprise DNS Services MAKING ENTERPRISE DNS SERVICES AN OPTION FOR THE ENTIRE WORLD

Add to Reading List

Source URL: www.dnsmadeeasy.com

Language: English - Date: 2015-12-08 13:37:24
993VOLUME THREE · ISSUE TWO Secure Business Quarterly: Defining the Value of Strategic Security ILLUSTRATION: JUD GUITTEAU

VOLUME THREE · ISSUE TWO Secure Business Quarterly: Defining the Value of Strategic Security ILLUSTRATION: JUD GUITTEAU

Add to Reading List

Source URL: adam.shostack.org

Language: English - Date: 2014-06-11 12:01:38
994Baiting Inside Attackers Using Decoy Documents Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo Department of Computer Science Columbia University  Abstract. The insider threat remains one of th

Baiting Inside Attackers Using Decoy Documents Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo Department of Computer Science Columbia University Abstract. The insider threat remains one of th

Add to Reading List

Source URL: ids.cs.columbia.edu

Language: English - Date: 2011-09-04 10:44:35
995APRILISSUE #10 UKRAINE UNDER ATTACK NEWSLETTER ON RUSSIAN OCCUPATION OF CRIMEA

APRILISSUE #10 UKRAINE UNDER ATTACK NEWSLETTER ON RUSSIAN OCCUPATION OF CRIMEA

Add to Reading List

Source URL: www.scotlandrussiaforum.org

Language: English - Date: 2016-03-03 11:08:49
    996AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks Seungwon Shin† †  Vinod Yegneswaran‡

    AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks Seungwon Shin† † Vinod Yegneswaran‡

    Add to Reading List

    Source URL: faculty.cse.tamu.edu

    Language: English - Date: 2013-08-28 15:18:02
    997Spin versus Reality: Excepts from the Lovingier disciplinary report A Denver Safety Department disciplinary report on Denver Sheriff’s Deputy Brady Loviniger’s attack on inmate Anthony Waller found several major hole

    Spin versus Reality: Excepts from the Lovingier disciplinary report A Denver Safety Department disciplinary report on Denver Sheriff’s Deputy Brady Loviniger’s attack on inmate Anthony Waller found several major hole

    Add to Reading List

    Source URL: coloradoindependent.com

    Language: English - Date: 2014-02-13 12:27:30
      998Index account, 189 account-based issuing protocol, 189 account-less issuing protocol, 190 ACES, 4, 13, 18, 25 active attack, 46

      Index account, 189 account-based issuing protocol, 189 account-less issuing protocol, 190 ACES, 4, 13, 18, 25 active attack, 46

      Add to Reading List

      Source URL: www.credentica.com

      Language: English - Date: 2004-05-24 21:00:38
        999Designs, Codes and Cryptography manuscript No.  (will be inserted by the editor) Proving TLS-attack related open biases of RC4 Santanu Sarkar · Sourav Sen Gupta ·

        Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) Proving TLS-attack related open biases of RC4 Santanu Sarkar · Sourav Sen Gupta ·

        Add to Reading List

        Source URL: www.souravsengupta.com

        Language: English - Date: 2014-08-03 10:57:23
          1000SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks. 2009; 2:83–96 Published online 24 September 2008 in Wiley InterScience (www.interscience.wiley.com) DOI: sec.58  Network risk management using attack

          SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks. 2009; 2:83–96 Published online 24 September 2008 in Wiley InterScience (www.interscience.wiley.com) DOI: sec.58 Network risk management using attack

          Add to Reading List

          Source URL: nsl.cse.unt.edu

          Language: English - Date: 2011-12-20 17:57:32