Attack

Results: 9771



#Item
901

Attack Plan Recognition and Prediction Using Causal Networks Xinzhou Qin and Wenke Lee Georgia Institute of Technology Atlanta, GA 30332, U.S.A. {xinzhou, wenke}@cc.gatech.edu Abstract

Add to Reading List

Source URL: wenke.gtisc.gatech.edu

Language: English - Date: 2011-08-22 15:12:58
    902Cryptography / Py / Differential cryptanalysis / Advanced Encryption Standard / Block cipher / Bart Preneel / Side-channel attack / Cryptanalysis / ICE

    ISCOn Security of a White-Box Implementation of SHARK Yang SHI and Hongfei FAN

    Add to Reading List

    Source URL: isc2015.item.ntnu.no

    Language: English - Date: 2015-09-20 14:17:24
    903

    PComP™ M MesoCoat Inc. proposed novel nano-composite, solid lubricant coatings generated by High Velocity Oxygen Fuel (HVOF) spraying of nano/mesostructured powders to reduce the liquid metal attack to the tooling. Th

    Add to Reading List

    Source URL: mesocoat.com

    Language: English - Date: 2014-08-07 09:16:55
      904Internet security / Internet Standards / Internet protocols / Secure communication / Dark web / IP hijacking / Tor / Border Gateway Protocol / Traffic analysis / Denial-of-service attack / Transmission Control Protocol

      RAPTOR: Routing Attacks on Privacy in Tor arXiv:1503.03940v1 [cs.NI] 13 Mar 2015 Yixin Sun Princeton University

      Add to Reading List

      Source URL: vanbever.eu

      Language: English - Date: 2015-03-17 04:19:13
      905

      MARCHISSUE # 7 UKRAINE UNDER ATTACK NEWSLETTER ON RUSSIAN OCCUPATION OF CRIMEA

      Add to Reading List

      Source URL: www.scotlandrussiaforum.org

      Language: English - Date: 2016-03-04 13:30:09
        906

        APRILISSUE #11 UKRAINE UNDER ATTACK NEWSLETTER ON RUSSIAN OCCUPATION OF CRIMEA

        Add to Reading List

        Source URL: www.scotlandrussiaforum.org

        Language: English - Date: 2016-03-04 13:30:09
          907Computer architecture / Computing / Computer engineering / Central processing unit / Computer memory / Instruction set architectures / Cache / Advanced Encryption Standard / CPU cache / Side-channel attack / ARM architecture / Reduced instruction set computing

          Low-Cost Software Countermeasures Against Fault Attacks: Implementation and Performances Trade Offs Alessandro Barenghi Luca Breveglieri

          Add to Reading List

          Source URL: euler.ecs.umass.edu

          Language: English - Date: 2011-03-24 10:57:36
          908Computing / Software / Digital media / Email / Social networking services / Webmail / Spamming / Social information processing / Renren / Sybil attack / Sybil / Gmail

          Jiang J, Shan ZF, Wang X et al . JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY : 1– Mon. Year Understanding Sybil Groups in the Wild Jing Jiang1,2 (蒋 竞), Member, CCF, Zifei Shan2 (单子非), Xiao Wang2 (王 潇) Li Z

          Add to Reading List

          Source URL: www.zifeishan.org

          Language: English - Date: 2014-12-18 18:37:50
          909Network performance / Computing / Network management / Internet security / System software / Denial-of-service attacks / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Packet loss / Throughput / Transmission Control Protocol

          Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks Ryan Rasti∗† , Mukul Murthy∗ , Nicholas Weaver∗† , Vern Paxson∗† ∗ UC Berkeley, † ICSI,  VMware Abstract—We introduce tempor

          Add to Reading List

          Source URL: icir.org

          Language: English - Date: 2015-04-22 12:30:04
          UPDATE