Attack

Results: 9771



#Item
781Computing / Security / Humancomputer interaction / Automatic identification and data capture / Computational linguistics / Speech processing / Computer network security / Computer accessibility / Speech recognition / Speaker recognition / Biometrics / Spoofing attack

Human vs Machine Spoofing Detection on Wideband and Narrowband Data Mirjam Wester1 , Zhizheng Wu1 , Junichi Yamagishi1,2 1 The Centre for Speech Technology Research, The University of Edinburgh, UK 2

Add to Reading List

Source URL: www.cstr.ed.ac.uk

Language: English - Date: 2015-09-29 11:06:25
782

For Critical Infrastructure—Buildings Myth: You are protected from an active shooter attack while at work in your office building, or in a shopping mall.

Add to Reading List

Source URL: shotspotter.com

Language: English - Date: 2014-12-15 20:28:45
    783

    The Virginia Anti-Violence Project deplores the brutal attack against a transgender woman individual in Fredericksburg, Virginia that occurred on May 21, 2011

    Add to Reading List

    Source URL: virginiaavp.org

    Language: English - Date: 2011-06-06 16:25:25
      784Cyberwarfare / Computer security / Computer network security / Cybercrime / National security / Cyber-attack / Denial-of-service attack / Malware / Stuxnet / Botnet / Attack / Spyware

      Global Mapping of Cyber Attacks Ghita Mezzour, L. Richard Carley, Kathleen M. Carley 2014 CMU-ISR

      Add to Reading List

      Source URL: www.casos.cs.cmu.edu

      Language: English
      785Biology / Plant reproduction / Agriculture / Insecticides / Botany / Seeds / Seed treatment / Neonicotinoid / Seed / Pesticide toxicity to bees / Sowing / German beekill incident

      Seed treatment is the precise application of biological organisms, products and/or chemical ingredients to seed to suppress, control, or repel plant pathogens, insects, or other pests that attack

      Add to Reading List

      Source URL: seed-treatment-guide.com

      Language: English - Date: 2014-12-05 14:19:29
      786League of Conservation Voters / Politics of the United States

      November 17, 2014 United States House of Representatives Washington, DCRe: Oppose H.R. 1422, H.R. 4012, and H.R. 4795: An Attack on Scientific Integrity and Public Health Dear Representative:

      Add to Reading List

      Source URL: www.lcv.org

      Language: English - Date: 2014-11-18 09:09:02
      787

      ATTACK the Source! A Author:

      Add to Reading List

      Source URL: edu.lva.virginia.gov

      - Date: 2015-06-25 12:33:54
        788

        A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes Ernie Brickell1 Liqun Chen2

        Add to Reading List

        Source URL: www.intrust2012.com

        Language: English - Date: 2012-12-19 04:59:00
          789

          Basic Attack : Destroy an opponent’s ship Basic Attack

          Add to Reading List

          Source URL: www.apegames.com

          - Date: 2015-04-19 15:20:40
            790Domain name system / Top-level domains / Internationalized domain names / .org / IDN homograph attack / .

            .tel Icelandic Language IDN Policy March 2015 .tel Icelandic Language IDN Policy March 2015

            Add to Reading List

            Source URL: d21po8gip7hnk5.cloudfront.net

            Language: English - Date: 2015-06-24 16:01:43
            UPDATE