Attack tree

Results: 40



#Item
1SPV: Secure Path Vector Routing for Securing BGP  ∗ Yih-Chun Hu Adrian Perrig

SPV: Secure Path Vector Routing for Securing BGP ∗ Yih-Chun Hu Adrian Perrig

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:13
2Cryptanalysis of splay tree based encryption Jean-Philippe Aumasson Nagravision SA, Switzerland Abstract. We present a chosen-plaintext attack on KIST, a recently proposed encryption scheme based on splay trees. Our atta

Cryptanalysis of splay tree based encryption Jean-Philippe Aumasson Nagravision SA, Switzerland Abstract. We present a chosen-plaintext attack on KIST, a recently proposed encryption scheme based on splay trees. Our atta

Add to Reading List

Source URL: 131002.net

Language: English - Date: 2012-08-14 06:46:48
    3MEALY BUGS ATTACK ON RAIN TREE  Geography of Mumbai city The Deccan region of India, the capital city of Maharashtra and economical capital of country, Mumbai lies on the western coast of India by the bank of Arabian Sea

    MEALY BUGS ATTACK ON RAIN TREE Geography of Mumbai city The Deccan region of India, the capital city of Maharashtra and economical capital of country, Mumbai lies on the western coast of India by the bank of Arabian Sea

    Add to Reading List

    Source URL: www.mcgm.gov.in

    - Date: 2015-02-11 05:44:17
      4Role of tree drought stress in GSOB attack  Nancy Grulke and Tom Coleman PSW Research-Riverside and FHP, Southern California

      Role of tree drought stress in GSOB attack Nancy Grulke and Tom Coleman PSW Research-Riverside and FHP, Southern California

      Add to Reading List

      Source URL: fhm.fs.fed.us

      Language: English - Date: 2010-08-06 16:57:15
      5CS 161  Fall 2005 Computer Security

      CS 161 Fall 2005 Computer Security

      Add to Reading List

      Source URL: www-inst.eecs.berkeley.edu

      Language: English - Date: 2005-11-28 06:37:33
      62014 IEEE Security and Privacy Workshops  Understanding Insider Threat: A Framework for Characterising Attacks Jason R.C. Nurse† , Oliver Buckley† , Philip A. Legg† , Michael Goldsmith† , Sadie Creese† , Gordon

      2014 IEEE Security and Privacy Workshops Understanding Insider Threat: A Framework for Characterising Attacks Jason R.C. Nurse† , Oliver Buckley† , Philip A. Legg† , Michael Goldsmith† , Sadie Creese† , Gordon

      Add to Reading List

      Source URL: ieee-security.org

      Language: English - Date: 2014-04-30 03:10:27
      7Predicting mountain pine beetle (Dendroctonus ponderosae) attack and delayed tree mortality in fire-injured lodgepole (Pinus contorta) and ponderosa (P. ponderosa) pines Darren  c

      Predicting mountain pine beetle (Dendroctonus ponderosae) attack and delayed tree mortality in fire-injured lodgepole (Pinus contorta) and ponderosa (P. ponderosa) pines Darren c

      Add to Reading List

      Source URL: fhm.fs.fed.us

      Language: English - Date: 2011-03-01 14:59:38
      8Filesystems timing attacks ZeroNights, Moscow, research

      Filesystems timing attacks ZeroNights, Moscow, research

      Add to Reading List

      Source URL: 2013.zeronights.org

      Language: English - Date: 2013-11-13 04:03:01
      9Limiting Sybil Attacks in Structured P2P Networks Hosam Rowaihy, William Enck, Patrick McDaniel, and Thomas La Porta Department of Computer Science and Engineering Pennsylvania State University University Park, PA 16802

      Limiting Sybil Attacks in Structured P2P Networks Hosam Rowaihy, William Enck, Patrick McDaniel, and Thomas La Porta Department of Computer Science and Engineering Pennsylvania State University University Park, PA 16802

      Add to Reading List

      Source URL: www.enck.org

      Language: English
      10Learning Attack Strategies from Intrusion Alerts  ∗ Peng Ning

      Learning Attack Strategies from Intrusion Alerts ∗ Peng Ning

      Add to Reading List

      Source URL: discovery.csc.ncsu.edu

      Language: English - Date: 2011-11-09 13:26:02