Attack

Results: 9771



#Item
641

CYBER AND THE CITY Making the UK financial and professional services sector more resilient to cyber attack May 2016 $

Add to Reading List

Source URL: www.thecityuk.com

Language: English - Date: 2016-05-24 09:37:34
    642Algebraic curves / Abstract algebra / Algebra / Mathematics / Hyperelliptic curve / ArtinSchreier curve / Elliptic curve / Hyperelliptic curve cryptography / Trace Zero Cryptography

    Elliptic and hyperelliptic curves with weak coverings, ECC2007 Elliptic and hyperelliptic curves with weak coverings against Weil descent attack Jinhui Chao Joint work with Fumiyuki Momose

    Add to Reading List

    Source URL: mathsci.ucd.ie

    Language: English - Date: 2007-09-14 09:56:18
    643

    Cryptanalysis of splay tree based encryption Jean-Philippe Aumasson Nagravision SA, Switzerland Abstract. We present a chosen-plaintext attack on KIST, a recently proposed encryption scheme based on splay trees. Our atta

    Add to Reading List

    Source URL: 131002.net

    Language: English - Date: 2012-08-14 06:46:48
      644Computing / Software engineering / Memory management / Software / Computer memory / Program analysis / Control flow graph / Data-flow analysis / Data buffer / C dynamic memory allocation / Stack / Call stack

      HI-CFG: Construction by Binary Analysis, and Application to Attack Polymorphism Dan Caselden1 , Alex Bazhanyuk2 , Mathias Payer3 , Stephen McCamant4 , and Dawn Song3 1

      Add to Reading List

      Source URL: hexhive.github.io

      Language: English - Date: 2016-06-13 11:08:40
      645Computing / Computer security / Software / Software bugs / C standard library / Address space layout randomization / Return-oriented programming / Stack buffer overflow / Return-to-libc attack / Buffer overflow / PaX / Uncontrolled format string

      String Oriented Programming: When ASLR is not Enough Mathias Payer Thomas R. Gross Department of Computer Science

      Add to Reading List

      Source URL: hexhive.github.io

      Language: English - Date: 2016-06-13 11:08:40
      646Cyberwarfare / Internet Relay Chat / Denial-of-service attacks / Neustar / Denial-of-service attack / Computing / DDoS mitigation / Internet / Cyberspace / Prolexic Technologies

      Neustar SiteProtect | Service Sheet Neustar SiteProtect Hybrid ® Always-On DDoS Protection. Zero Effort.

      Add to Reading List

      Source URL: www.neustar.biz

      Language: English - Date: 2014-06-13 11:10:46
      647

      CONSUMER ALERT Counterfeit Coupon Phishing Attack Consumers are cautioned that unknown individuals are apparently distributing the counterfeit coupon reproduced below via Facebook. The counterfeit appears to serve as bai

      Add to Reading List

      Source URL: www.couponinformationcenter.com

      Language: English - Date: 2016-05-12 17:07:57
        648

        Adversarial Label Flips Attack on Support Vector Machines Han Xiao and Huang Xiao and Claudia Eckert1 Abstract. To develop a robust classification algorithm in the adversarial setting, it is important to understand the a

        Add to Reading List

        Source URL: home.in.tum.de

        Language: English - Date: 2012-12-24 14:22:54
          649

          I see my Dr every 2 months of snovitra 40 mg treatment. The dosage is based on your computer even when you stop using Adipex-P. Spanning the history of heart attack and stroke. This is because the brain and working wonde

          Add to Reading List

          Source URL: pulseseismic.com

          Language: English - Date: 2016-06-18 16:34:56
            650

            Ma Long´s Technique Ma Long, the latest men-single winner in Asian games, has beaten lots of top players in the world. Characteristic of his game is obvious - very good at initiating attack, fast and fierce, consistent

            Add to Reading List

            Source URL: tabletennismatch.com

            Language: English - Date: 2016-03-28 06:57:26
              UPDATE