Attack

Results: 9771



#Item
611Cybercrime / Cyberwarfare / Social engineering / E-commerce / Computer network security / Phishing / Denial-of-service attack / Computer security / Targeted threat / Bitcoin / Malware / Supply chain attack

Financial Sector Threats 2015 Year in Review 1 Table of Contents

Add to Reading List

Source URL: info.digitalshadows.com

Language: English - Date: 2016-06-14 16:59:05
612RTT / Psychology / Psychiatry / Emotion / Psychiatric diagnosis / Grammar / Abnormal psychology / Anxiety / Panic attack / Anxiety disorder / Panic disorder / Panic

PHQ-PANIC ASSESSMENT PHQ-Panic Source: The items come from the Panic items of the PHQ Reference: Spitzer, R., Kroenke, K., & Williams, JValidation and utility of a self-report version of PRIMEMD: the PHQ Prima

Add to Reading List

Source URL: afterdeployment.dcoe.mil

Language: English - Date: 2013-11-18 12:00:24
613

Darwinism is Materialist Mythology, Not Science Phillip E. Johnson British newspaper readers know that Richard Dawkins, with his allies in the press and among the liberal clergy, has been waging a strident attack upon sc

Add to Reading List

Source URL: www.nmidnet.org

Language: English - Date: 2009-01-11 22:25:52
    614Secure communication / Cyberwarfare / Cybercrime / National security / E-commerce / Sustainable Asset Management / Computer security / Dow Jones Sustainability Indices / Robeco / Cyber-Insurance / Data breach / International Multilateral Partnership Against Cyber Threats

    Cybersecurity – companies, you are under attack The cyber threat is omnipresent. A quick look at newspaper headlines reveals that companies from a variety of sectors such as financial services provider JP Morg

    Add to Reading List

    Source URL: www.robecosam.com

    Language: English - Date: 2016-06-15 04:29:16
    615Central processing unit / Machine code / Software bugs / Return-oriented programming / Computer memory / Instruction set architectures / Buffer overflow protection / Self-modifying code / Subroutine / Stack / Return-to-libc attack / Instruction set

    CFIMon: Detecting Violation of Control Flow Integrity using Performance Counters Yubin Xia† ‡, Yutao Liu† ‡, Haibo Chen†, Binyu Zang‡ †Institute of Parallel and Distributed Systems, Shanghai Jiao Tong Unive

    Add to Reading List

    Source URL: ipads.se.sjtu.edu.cn

    Language: English - Date: 2012-08-23 22:16:01
    616Cryptography / Computer network security / Computer security / Transport Layer Security / Cryptographic software / Vulnerability / FREAK / OpenSSL / Exploit / Attack / Common Vulnerabilities and Exposures / Shellshock

    Vulnerabilities At a glance Description A look into software vulnerabilities, whether we are

    Add to Reading List

    Source URL: www.kennasecurity.com

    Language: English - Date: 2016-04-26 13:43:51
    617Computer memory / Computer architecture / Central processing unit / Cache / CPU cache / Parallel computing / Row hammer / Dynamic random-access memory / Shared memory / Microarchitecture / Draft:Cache memory / Cold boot attack

    HexPADS: a platform to detect “stealth” attacks Mathias Payer Purdue University Abstract. Current systems are under constant attack from many different sources. Both local and remote attackers try to escalate their p

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    618

    THE IRS’S ATTACK ON 831(b) CAPTIVE INSURANCE BY DEREK W. KACZMAREK, ESQ.

    Add to Reading List

    Source URL: www.nvbar.org

    Language: English - Date: 2016-04-26 15:14:14
      619Cryptography / Public-key cryptography / Cryptographic protocols / Ciphertext indistinguishability / Homomorphic encryption / Adaptive chosen-ciphertext attack / Optimal asymmetric encryption padding / RSA / Secure multi-party computation / Chosen-ciphertext attack / Malleability / ID-based encryption

      Controlled Functional Encryption Muhammad Naveed1 , Shashank Agrawal1 , Manoj Prabhakaran1 , Xiaofeng Wang2 , Erman Ayday3 , Jean-Pierre Hubaux3 and Carl A. Gunter1 1 University of Illinois at Urbana-Champaign

      Add to Reading List

      Source URL: web.engr.illinois.edu

      Language: English - Date: 2014-08-27 22:14:05
      620

      Contemporary Mathematics An attack on a group-based cryptographic scheme Dennis Hofheinz and Dominique Unruh Abstract. We give an attack on a public key encryption scheme suggested

      Add to Reading List

      Source URL: www.kjdf.de

      Language: English - Date: 2014-06-10 05:37:38
        UPDATE