Attack

Results: 9771



#Item
11999 / Linguistics / Latin grammar / Syntax / Grammar / Language

What to do in the event of an attack by an armed person or persons x The purpose of this guidance is to alert and not to alarm – it is not being provided in response to any specific information.

Add to Reading List

Source URL: www.trinity.ox.ac.uk

Language: English - Date: 2016-01-22 12:25:12
12Economy / Money / Finance / Mobile payments / Payment systems / ISO standards / Mobile telecommunications / Online payments / Near-field communication / EMV / Apple Pay / Payment terminal

Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment Maryam Mehrnezhad, Feng Hao, and Siamak F. Shahandashti School of Computing Science, Newcastle University, Newcastle upon Tyne, United Kingdom {m.mehrnezh

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2015-09-24 14:01:42
13Medicine / Cardiac electrophysiology / Clinical medicine / Physiology / Electrocardiography / Cardiac monitoring / Signal generator / Monitoring / Digital signal / QRS complex / Wireless ambulatory ECG / Automated ECG interpretation

Broken Hearted: How To Attack ECG Biometrics Simon Eberz Nicola Paoletti Marc Roeschlin

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2017-03-14 06:12:08
14Mobile technology / Technology / Data mining / Wireless / Mobile telecommunications / Videotelephony / Anomaly detection / Data security / Machine learning / Local outlier factor / Computer network / UMTS

Visual Analytics for enhancing supervised attack attribution in mobile networks∗ Stavros Papadopoulos, Vasilios Mavroudis, Anastasios Drosou, and Dimitrios Tzovaras Abstract Researchers have recently uncovered numerous

Add to Reading List

Source URL: mavroud.is

Language: English - Date: 2018-10-23 09:34:50
15Bish / Editorial cartoonist / Pittsburgh Tribune-Review / Newsroom / AAEC / Beeler

Are U.S. newsrooms under attack? Talking Points Nate Beeler, The Columbus Dispatch / Courtesy of AAEC Between the lines

Add to Reading List

Source URL: nieonline.com

Language: English - Date: 2018-07-08 15:40:42
16Metaphysics / Humanities / Terminology / Archaeological theory / Data collection / Evidence law / Museology / Provenance / Seeds / Causality / Inode / System call

Rain: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking

Add to Reading List

Source URL: acmccs.github.io

Language: English - Date: 2017-12-30 21:51:59
17Cryptography / Stream ciphers / Block cipher / RC4 / Block size / Triple DES / ARIA / M6 / Transport Layer Security / Symmetric-key algorithm

Introduction Towards a Practical attack Attack against TLS

Add to Reading List

Source URL: sweet32.info

Language: English - Date: 2016-10-26 08:43:15
18Cryptography / Cryptographic hash functions / Error detection and correction / Streebog / GOST / Preimage attack / SHA-3 / MD5 / SHA-2 / SHA-1 / Hash function / BLAKE

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function Jian Guo1 , J´er´emy Jean1 , Ga¨etan Leurent2 , Thomas Peyrin1 , and Lei Wang1 1

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:34
19

Research conducted by EPRI for: NESCOR – a DOE funded public-private partnership Attack Trees for Selected Electric Sector High Risk Failure Scenarios

Add to Reading List

Source URL: smartgrid.epri.com

Language: English - Date: 2018-04-23 15:23:35
    20

    Linking OAE and Blockwise Attack Models Fast Software Encryption 2017 Guillaume Endignoux1,2 , Damian Vizár1 1 EPFL,

    Add to Reading List

    Source URL: www.nuee.nagoya-u.ac.jp

    Language: English - Date: 2017-03-06 13:58:14
      UPDATE