Attack

Results: 9771



#Item
281Computing / Network performance / Computer network security / Network management / Cyberwarfare / Multi-agent systems / Spamming / Botnet / Transmission Control Protocol / Traffic classification / Denial-of-service attack / Measuring network throughput

C:/Users/beck/Desktop/CSET CONFERENCE 2010/USENIX template/4_11_DRAFT2/jayaram_drmiller changes/FINAL_SUBMISSION_AFTER REVIEW/CSET_submission.dvi

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-07-08 13:42:23
282Security / Prevention / Cyberwarfare / National security / Safety / Cybercrime / Infrastructure / NIST Cybersecurity Framework / Resilience / Computer security / Cyber-attack / Psychological resilience

Cyber Resiliency Engineering Aid - Cyber Resiliency Techniques

Add to Reading List

Source URL: www.defenseinnovationmarketplace.mil

Language: English - Date: 2015-10-09 09:54:58
283Military aircraft / Aircraft / Aviation / Carrier-based aircraft / Fighter aircraft / Hornet / Attack aircraft / Boeing F/A-18E/F Super Hornet / McDonnell Douglas F/A-18 Hornet

PDF Document

Add to Reading List

Source URL: www.californiacapitalairshow.com

Language: English - Date: 2015-08-07 17:45:31
284Wireless networking / Cryptography / Technology / Computing / Vehicular ad hoc network / Wireless ad hoc network / Key distribution / Vehicular communication systems / Public-key cryptography / Key management / Vehicle-to-vehicle / Man-in-the-middle attack

GlobecomCommunication and Information System Security Symposium Probabilistic Key Distribution in Vehicular Networks with Infrastructure Support Jo˜ao Almeida∗ , Saurabh Shintre∗† , Mate Boban∗† , and

Add to Reading List

Source URL: mateboban.net

Language: English - Date: 2013-07-15 15:54:45
285Computer security / Security / Cyberwarfare / Computer network security / Qualys / Vulnerability / Attack / Asset / Threat

Solution Brief: Top 6 Security Use Cases for Automated Asset Inventory SOLUTION BRIEF TOP 6 SECURITY USE CASES

Add to Reading List

Source URL: www.qualys.com

Language: English - Date: 2016-01-15 14:54:13
286Aviation / Aeronautics / Business / Aerodynamics / Stall / Angle of attack / Coffin corner / Private pilot / Flight instructor / Pilot / Federal Aviation Administration

The Localizer Newsletter of the Aviation Program VOLUME 1, ISSUE 1 APRIL 2009

Add to Reading List

Source URL: ed.mnsu.edu

Language: English - Date: 2011-02-16 18:11:12
287Data management / Computing / Information retrieval / SQL / Database theory / Database management systems / Relational database / Join / Database / Hierarchical and recursive queries in SQL / SQL injection / Data integration

A Data-Centric Approach to Insider Attack Detection in Database Systems Sunu Mathew1, , Michalis Petropoulos2, Hung Q. Ngo2 , and Shambhu Upadhyaya2 1

Add to Reading List

Source URL: www.cse.buffalo.edu

Language: English - Date: 2010-07-20 10:35:48
288Foreign relations / Law / International relations / Nuclear proliferation / Nuclear weapons / Treaty on the Non-Proliferation of Nuclear Weapons / Nuclear terrorism / Nuclear power / Nuclear disarmament / Nuclear and radiation accidents and incidents / International Atomic Energy Agency / Vulnerability of nuclear plants to attack

Microsoft Word - A327 Enforcing Nuclear Disarmament _2005_

Add to Reading List

Source URL: www2.gwu.edu

Language: English - Date: 2009-07-22 14:34:26
289Cryptography / Authenticated encryption / Symmetric-key cryptography / Initialization vector / Block cipher mode of operation / Semantic security / Pseudorandom function family / Key Wrap / Advantage / Chosen-plaintext attack / Probabilistic encryption / Ciphertext indistinguishability

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-08-20 03:23:28
UPDATE