Attack

Results: 9771



#Item
241Aircraft / Homebuilt aircraft / Aviation

PSS:AOAorder.doc Angle of Attack Order Form

Add to Reading List

Source URL: www.advanced-flight-systems.com

Language: English - Date: 2011-01-18 18:05:47
242Hillary Clinton / United States / Benghazi attack / Exploratory committee / Cheryl Mills

MEMORANDUM March 20, 2015 TO: SENIOR STAFF

Add to Reading List

Source URL: guccifer2.files.wordpress.com

Language: English - Date: 2016-06-17 19:40:15
243Computing / Computer security / Software bugs / Address space layout randomization / Gadget / Buffer overflow / Return-to-libc attack / Shellcode / Instruction selection / Position-independent code / NOP / Return-oriented programming

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
244Computer security / Security / Cyberwarfare / Computer network security / Data security / E-commerce / Security controls / Vulnerability / Cyber security standards / Supply chain attack

GE Oil & Gas Cyber Security Solutions for Industrial Controls OVERVIEW

Add to Reading List

Source URL: www.geoilandgas.com

Language: English - Date: 2016-08-09 11:53:34
245Burlington County /  New Jersey / Delaware Valley / Anwar al-Awlaki / Islamic terrorism in the United States / Fort Dix attack plot / Fort Dix / Chris Christie / Dix

Media Advisory FOR IMMEDIATE RELEASE December 29, 2015 Contact: Joe Piette, , cellLynne Jackson, , cell

Add to Reading List

Source URL: projectsalam.org

Language: English - Date: 2015-12-30 22:49:49
246Avionics / Aviation / Air traffic control / Technology / Business / Automatic dependent surveillance  broadcast / Secondary surveillance radar / Flightradar24 / Computer network / DO-242A / IEEE 802.11 / Denial-of-service attack

On the Security of the Automatic Dependent Surveillance-Broadcast Protocol arXiv:1307.3664v2 [cs.CR] 15 AprMartin Strohmeier∗ , Vincent Lenders+ , Ivan Martinovic∗

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2014-12-19 11:12:15
247Cryptography / Cache / Computer memory / Advanced Encryption Standard / Side-channel attack / Data Encryption Standard / Cache memory / Lookup table / Cryptanalysis / Tiny Encryption Algorithm / Block cipher / CPU cache

Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

Add to Reading List

Source URL: cs.tau.ac.il

Language: English - Date: 2009-06-25 15:56:23
248Cryptography / Ciphertext indistinguishability / Semantic security / Malleability / Advantage / Chosen-ciphertext attack / Chosen-plaintext attack / Encryption / RSA / Probabilistic encryption / Optimal asymmetric encryption padding

Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2003-08-29 18:48:12
249France / Battle of the Somme / Military history by country / World War I / Edward Montagu-Stuart-Wortley / Hbuterne / The Battle of the Somme / Leipzig Salient / Battle of Delville Wood / Attack on the Gommecourt Salient / Capture of Ovillers

Z E RO H O U R 100 years on: views from the parapet of the Somme The original, hand-annotated panoramas contained in this book are being exhibited at the Sladmore Contemporary gallery over the centenary of the battle. Fo

Add to Reading List

Source URL: profilebooks.com

Language: English - Date: 2016-07-25 00:01:55
250Software / Computing / Cybercrime / Web browsers / Embedded Linux / Freeware / Portable software / Phishing / HTTP cookie / Opera / Computer security / Web browsing history

Int. Secure Systems Lab Vienna University of Technology A Practical Attack to De­Anonymize Social  Network Users

Add to Reading List

Source URL: oakland31.cs.virginia.edu

Language: English - Date: 2010-05-22 10:36:07
UPDATE