Attack

Results: 9771



#Item
11What to do in the event of an attack by an armed person or persons x The purpose of this guidance is to alert and not to alarm – it is not being provided in response to any specific information.

What to do in the event of an attack by an armed person or persons x The purpose of this guidance is to alert and not to alarm – it is not being provided in response to any specific information.

Add to Reading List

Source URL: www.trinity.ox.ac.uk

Language: English - Date: 2016-01-22 12:25:12
12Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment Maryam Mehrnezhad, Feng Hao, and Siamak F. Shahandashti School of Computing Science, Newcastle University, Newcastle upon Tyne, United Kingdom {m.mehrnezh

Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment Maryam Mehrnezhad, Feng Hao, and Siamak F. Shahandashti School of Computing Science, Newcastle University, Newcastle upon Tyne, United Kingdom {m.mehrnezh

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2015-09-24 14:01:42
13Broken Hearted: How To Attack ECG Biometrics Simon Eberz Nicola Paoletti  Marc Roeschlin

Broken Hearted: How To Attack ECG Biometrics Simon Eberz Nicola Paoletti Marc Roeschlin

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2017-03-14 06:12:08
14Visual Analytics for enhancing supervised attack attribution in mobile networks∗ Stavros Papadopoulos, Vasilios Mavroudis, Anastasios Drosou, and Dimitrios Tzovaras Abstract Researchers have recently uncovered numerous

Visual Analytics for enhancing supervised attack attribution in mobile networks∗ Stavros Papadopoulos, Vasilios Mavroudis, Anastasios Drosou, and Dimitrios Tzovaras Abstract Researchers have recently uncovered numerous

Add to Reading List

Source URL: mavroud.is

Language: English - Date: 2018-10-23 09:34:50
15Are U.S. newsrooms under attack? Talking Points Nate Beeler, The Columbus Dispatch / Courtesy of AAEC  Between the lines

Are U.S. newsrooms under attack? Talking Points Nate Beeler, The Columbus Dispatch / Courtesy of AAEC Between the lines

Add to Reading List

Source URL: nieonline.com

Language: English - Date: 2018-07-08 15:40:42
16Rain: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking

Rain: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking

Add to Reading List

Source URL: acmccs.github.io

Language: English - Date: 2017-12-30 21:51:59
17Introduction  Towards a Practical attack Attack against TLS

Introduction Towards a Practical attack Attack against TLS

Add to Reading List

Source URL: sweet32.info

Language: English - Date: 2016-10-26 08:43:15
18The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function Jian Guo1 , J´er´emy Jean1 , Ga¨etan Leurent2 , Thomas Peyrin1 , and Lei Wang1 1

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function Jian Guo1 , J´er´emy Jean1 , Ga¨etan Leurent2 , Thomas Peyrin1 , and Lei Wang1 1

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:34
19Research conducted by EPRI for: NESCOR – a DOE funded public-private partnership Attack Trees for Selected Electric Sector High Risk Failure Scenarios

Research conducted by EPRI for: NESCOR – a DOE funded public-private partnership Attack Trees for Selected Electric Sector High Risk Failure Scenarios

Add to Reading List

Source URL: smartgrid.epri.com

Language: English - Date: 2018-04-23 15:23:35
    20Linking OAE and Blockwise Attack Models Fast Software Encryption 2017 Guillaume Endignoux1,2 , Damian Vizár1 1 EPFL,

    Linking OAE and Blockwise Attack Models Fast Software Encryption 2017 Guillaume Endignoux1,2 , Damian Vizár1 1 EPFL,

    Add to Reading List

    Source URL: www.nuee.nagoya-u.ac.jp

    Language: English - Date: 2017-03-06 13:58:14