Attack model

Results: 101



#Item
1Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach Samuel Jero Endadul Hoque†

Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach Samuel Jero Endadul Hoque†

Add to Reading List

Source URL: www.ndss-symposium.org

Language: English - Date: 2018-02-14 16:46:14
    2XVIth INTERNATIONAL CIFA FORUM  REPEAL AND REPLACE AN ECONOMIC MODEL UNDER ATTACK?

    XVIth INTERNATIONAL CIFA FORUM REPEAL AND REPLACE AN ECONOMIC MODEL UNDER ATTACK?

    Add to Reading List

    Source URL: cifango.org

    Language: English - Date: 2018-05-18 13:11:15
      3Mathematical Biosciences–251 www.elsevier.com/locate/mbs Effects of behavioral changes in a smallpox attack model S. Del Valle

      Mathematical Biosciences–251 www.elsevier.com/locate/mbs Effects of behavioral changes in a smallpox attack model S. Del Valle

      Add to Reading List

      Source URL: public.lanl.gov

      Language: English - Date: 2013-03-15 13:18:42
      4Non-Malleability: An Introduction and Survey of Recent Developments Cynthia Dwork∗ 1

      Non-Malleability: An Introduction and Survey of Recent Developments Cynthia Dwork∗ 1

      Add to Reading List

      Source URL: www.wisdom.weizmann.ac.il

      Language: English - Date: 2006-01-05 12:45:55
      5A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds Yi-Hsuan Kungk , Taeho Lee† , Po-Ning Tsengk , Hsu-Chun Hsiaok ∗ , Tiffany Hyun-Jin Kim‡ ∗ , Soo Bum Lee§ ∗ , Yue-Hsun

      A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds Yi-Hsuan Kungk , Taeho Lee† , Po-Ning Tsengk , Hsu-Chun Hsiaok ∗ , Tiffany Hyun-Jin Kim‡ ∗ , Soo Bum Lee§ ∗ , Yue-Hsun

      Add to Reading List

      Source URL: www.netsec.ethz.ch

      Language: English - Date: 2015-09-10 05:14:02
      61  Clippee: A Large-Scale Client/Peer System Keno Albrecht, Ruedi Arnold, Roger Wattenhofer {kenoa,rarnold,wattenhofer}@inf.ethz.ch Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland

      1 Clippee: A Large-Scale Client/Peer System Keno Albrecht, Ruedi Arnold, Roger Wattenhofer {kenoa,rarnold,wattenhofer}@inf.ethz.ch Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland

      Add to Reading List

      Source URL: ruedi-arnold.com

      Language: English - Date: 2011-12-23 03:13:22
      7Microsoft PowerPoint - OWASP_SanAntonio_February2006_SecondMostSecureDatabase.ppt

      Microsoft PowerPoint - OWASP_SanAntonio_February2006_SecondMostSecureDatabase.ppt

      Add to Reading List

      Source URL: denimgroup.com

      Language: English - Date: 2014-01-13 18:30:26
      8Leakage-Abuse Attacks Against Searchable Encryption David Cash Paul Grubbs  Rutgers University

      Leakage-Abuse Attacks Against Searchable Encryption David Cash Paul Grubbs Rutgers University

      Add to Reading List

      Source URL: paul.rutgers.edu

      Language: English - Date: 2015-10-18 00:55:12
      9USING AN  EXPANDED CYBER KILL CHAIN MODEL TO INCREASE ATTACK RESILIENCY

      USING AN EXPANDED CYBER KILL CHAIN MODEL TO INCREASE ATTACK RESILIENCY

      Add to Reading List

      Source URL: www.seantmalone.com

      Language: English - Date: 2016-08-04 16:29:49