Attack ad

Results: 74



#Item
1Wireless networking / Cryptography / Technology / Computing / Vehicular ad hoc network / Wireless ad hoc network / Key distribution / Vehicular communication systems / Public-key cryptography / Key management / Vehicle-to-vehicle / Man-in-the-middle attack

GlobecomCommunication and Information System Security Symposium Probabilistic Key Distribution in Vehicular Networks with Infrastructure Support Jo˜ao Almeida∗ , Saurabh Shintre∗† , Mate Boban∗† , and

Add to Reading List

Source URL: mateboban.net

Language: English - Date: 2013-07-15 15:54:45
2Politics / Negative campaigning / Campaign advertising / Political campaign / Academia / Humanities / Independent voter / Polarization / Advertising / Attack ad

Polarization in Less than Thirty Seconds

Add to Reading List

Source URL: pcl.stanford.edu

Language: English - Date: 2011-05-31 14:45:58
3Elections / Politics / Political philosophy / Voting / Campaign advertising / Negative campaigning / Get out the vote / Voter turnout / Political campaign / Attack ad

Judges as elected officials, need to seek votes and to provide information

Add to Reading List

Source URL: pcl.stanford.edu

Language: English - Date: 2011-05-31 14:34:51
4

Attack Analysis and Detection for Ad Hoc Routing Protocols Yi-an Huang and Wenke Lee College of Computing Georgia Institute of Technology 801 Atlantic Dr.

Add to Reading List

Source URL: wenke.gtisc.gatech.edu

Language: English - Date: 2011-08-22 15:12:58
    5Barack Obama / United States presidential primaries / United States presidential election / John McCain presidential campaign / American Leadership Project / Attack ad / John McCain / Hillary Rodham Clinton / Negative campaigning / Politics / United States / Presidents of the United Nations Security Council

    FOR IMMEDIATE RELEASE June 2, 2008 CONTACT: Steve Rabinowitz

    Add to Reading List

    Source URL: wiscadproject.wisc.edu

    Language: English - Date: 2008-06-03 10:55:16
    6Advertising / Campaign advertising / American Leadership Project / Campaign finance in the United States / Barack Obama / Television advertisement / Hillary Clinton caucuses and primaries / Attack ad / Politics / Business / Marketing

    FOR IMMEDIATE RELEASE March 12, 2008 CONTACT: Aaron Keyak or Steve Rabinowitz

    Add to Reading List

    Source URL: wiscadproject.wisc.edu

    Language: English - Date: 2008-03-12 12:04:32
    7Rock the Vote / Political campaign / Voter turnout / Campaign advertising / United States presidential election / Attack ad / Politics / Elections / Negative campaigning

    Televised political ads and voter turnout: a theory of asymmetric partisan mobilization Jowei Chen1 and Kyle A. Dropp2 How does the partisan balance of Democratic and Republican political advertisements aired locally aff

    Add to Reading List

    Source URL: kyledropp.weebly.com

    Language: English - Date: 2013-09-12 11:24:23
    8Computing / Technology / Peer-to-peer / Distributed hash table / Sybil attack / Routing / David Karger / Support / Wireless ad-hoc network / Wireless networking / Distributed data storage / File sharing networks

    Jinyang Li Phone: ( Broadway Rm 708 New York, NY 10003

    Add to Reading List

    Source URL: www.news.cs.nyu.edu

    Language: English - Date: 2013-09-27 13:48:02
    9Computing / Hacking / Spamming / Electronic commerce / Secure communication / Denial-of-service attack / Zero-day attack / Vulnerability / Attack / Computer network security / Cyberwarfare / Computer security

    Infrastructure Security 1. Infrastructure Security The PlugX RAT Used in Targeted Attacks In this report, we discuss the PlugX RAT used in targeted attacks, and look at examples of

    Add to Reading List

    Source URL: www.iij.ad.jp

    Language: English - Date: 2015-05-20 03:08:06
    10Computing / DNS spoofing / Name server / Domain Name System Security Extensions / Root name server / Denial-of-service attack / Google Public DNS / Anycast / DNS hijacking / Domain name system / Internet / Network architecture

    Internet Operation 2. Internet Operation DNS Open Resolver Issues There has been a spate of incidents in which recursive DNS servers without appropriate access

    Add to Reading List

    Source URL: www.iij.ad.jp

    Language: English - Date: 2015-05-20 03:08:18
    UPDATE