Attack

Results: 9771



#Item
251Nuclear propulsion / United States Navy / Watercraft / Virginia-class submarine / USS North Carolina / USS New Mexico / SSN / USS Minnesota / United States naval reactors / USS Montana / USS Arkansas

THE VIRGINIA-CLASS AMERICA’S NEW FAST ATTACK SUBMARINES Using expertise from more than half a century of building submarines, NEWPORT NEWS SHIPBUILDING and GENERAL

Add to Reading List

Source URL: www.washingtonchristening.com

Language: English - Date: 2016-02-18 16:03:02
252Security / Prevention / Safety / Actuarial science / Computer network security / Computer security / Enterprise architecture / Department of Defense Architecture Framework / UPDM / Risk management / Threat / Vulnerability

Blade Risk Manager Automated Risk Assessment The cyber threats facing cyber systems demands a solution capable of understanding their enormity and complexity, visualizing attack options, assessing vulnerabilities and fac

Add to Reading List

Source URL: www.kdmanalytics.com

Language: English - Date: 2015-03-10 10:01:35
253Security / Cyberwarfare / Computer security / Hacking / Cross-site request forgery / Cross-site scripting / Confused deputy problem / Common Weakness Enumeration / Directory traversal attack / Vulnerability / Access control / Web framework

Research Report: Mitigating LangSec Problems With Capabilities Nathaniel Wesley Filardo Johns Hopkins University Baltimore, MD

Add to Reading List

Source URL: spw16.langsec.org

Language: English - Date: 2016-06-05 23:38:35
254Security / Prevention / Safety / National security / Business continuity / Civil defense / Resilience / Cyberwarfare / Systemically important payment systems / Computer security / Cyber threat intelligence / Cyber-attack

Committee on Payments and Market Infrastructures Board of the International Organization of Securities Commissions

Add to Reading List

Source URL: www.iosco.org

Language: English - Date: 2016-08-16 13:52:59
255Software / Computing / Academia / Social information processing / Network theory / Social networking services / Facebook / Self-organization / Recommender system / Internet privacy / Social network / Privacy

Chapter 1 Links Reconstruction Attack Using Link Prediction Algorithms to Compromise Social Networks Privacy Michael Fire, Gilad Katz, Lior Rokach, and Yuval Elovici1

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2013-11-01 17:29:17
256Security / Cyberwarfare / Prevention / Cybercrime / National security / Computer security / Hacking / Cyber-attack / Cyber / Thomas Rid / Stuxnet / Cyberterrorism

REVIEWS It is unlikely that any such organisation will ever be able to completely resolve this predicament, as by their very nature political movements seek to create parallel

Add to Reading List

Source URL: ridt.co

Language: English - Date: 2015-12-18 07:31:23
257Software testing / Computer security / Computing / Software engineering / Codenomicon / Fuzz testing / Oulu University Secure Programming Group / Denial-of-service attack / Test automation / Security testing / American fuzzy lop / Fault injection

Fuzzing Fuzzing: A Solution Chosen by the FDA to Investigate Detection of Software Vulnerabilities

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-07-06 08:58:36
258Computing / Markup languages / Document type definition / XML external entity attack / Billion laughs / XML schema / EXist / Document type declaration / Parsing / Expat / XSLT / SGML entity

SoK: XML Parser Vulnerabilities Christopher Späth Ruhr-University Bochum Christian Mainka Ruhr-University Bochum

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2016-07-22 08:14:52
259Security / Cyberwarfare / Computer network security / Computer security / Cryptography / National security / Secure communication / San Bernadino / Foresight

Jarrod Burguan, Chief of Police City of San Bernadino "Rapidly-evolving digital technology presents law enforcement with new and difficult challenges that we must be able to overcome. As the tragic attack in my hometown

Add to Reading List

Source URL: homeland.house.gov

Language: English - Date: 2016-03-16 10:19:05
260Game theory / Nash equilibrium / Best response / Strategy / Global game / Risk dominance / Solution concept / Coordination game / Outcome / Bayesian game / Folk theorem

OXFORD REVIEW OF ECONOMIC POLICY, VOL. 18, NO. 4 EXCHANGE-RATE ATTACK AS A COORDINATION GAME: THEORY AND EXPERIMENTAL EVIDENCE FRANK HEINEMANN

Add to Reading List

Source URL: www.macroeconomics.tu-berlin.de

Language: English - Date: 2008-11-06 16:24:21
UPDATE