Attack tree

Results: 40



#Item
1Routing protocols / Public-key cryptography / Hashing / Cryptography / Key management / Border Gateway Protocol / Cryptographic hash function / Hash chain / Merkle tree / RSA / Man-in-the-middle attack / Autonomous system

SPV: Secure Path Vector Routing for Securing BGP ∗ Yih-Chun Hu Adrian Perrig

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:13
2

Cryptanalysis of splay tree based encryption Jean-Philippe Aumasson Nagravision SA, Switzerland Abstract. We present a chosen-plaintext attack on KIST, a recently proposed encryption scheme based on splay trees. Our atta

Add to Reading List

Source URL: 131002.net

Language: English - Date: 2012-08-14 06:46:48
    3

    MEALY BUGS ATTACK ON RAIN TREE Geography of Mumbai city The Deccan region of India, the capital city of Maharashtra and economical capital of country, Mumbai lies on the western coast of India by the bank of Arabian Sea

    Add to Reading List

    Source URL: www.mcgm.gov.in

    - Date: 2015-02-11 05:44:17
      4Plant physiology / Plant morphology / Woodboring beetles / Hydrostatics / Water potential / Quercus velutina / Oak / Leaf / Tree / Botany / Biology / Flora of the United States

      Role of tree drought stress in GSOB attack Nancy Grulke and Tom Coleman PSW Research-Riverside and FHP, Southern California

      Add to Reading List

      Source URL: fhm.fs.fed.us

      Language: English - Date: 2010-08-06 16:57:15
      5Unix / Out-of-band / And–or tree / System software / Computing / Electronic engineering / Signaling / Password / Attack tree

      CS 161 Fall 2005 Computer Security

      Add to Reading List

      Source URL: www-inst.eecs.berkeley.edu

      Language: English - Date: 2005-11-28 06:37:33
      6Hacking / Software testing / Threat / Abuse / Vulnerability / Attack tree / Insider / Motivation / Computer network security / Cyberwarfare / Computer security

      2014 IEEE Security and Privacy Workshops Understanding Insider Threat: A Framework for Characterising Attacks Jason R.C. Nurse† , Oliver Buckley† , Philip A. Legg† , Michael Goldsmith† , Sadie Creese† , Gordon

      Add to Reading List

      Source URL: ieee-security.org

      Language: English - Date: 2014-04-30 03:10:27
      7Woodboring beetles / Mountain pine beetle / Bark beetle / Pinus ponderosa / Lodgepole Pine / Lodgepole / Dendroctonus / Flora of the United States / Curculionidae / Flora

      Predicting mountain pine beetle (Dendroctonus ponderosae) attack and delayed tree mortality in fire-injured lodgepole (Pinus contorta) and ponderosa (P. ponderosa) pines Darren c

      Add to Reading List

      Source URL: fhm.fs.fed.us

      Language: English - Date: 2011-03-01 14:59:38
      8System software / Htree / Ext3 / Ext2 / File system / Unix File System / B-tree / Timing attack / Disk file systems / Data management / Computing

      Filesystems timing attacks ZeroNights, Moscow, research

      Add to Reading List

      Source URL: 2013.zeronights.org

      Language: English - Date: 2013-11-13 04:03:01
      9Bootstrapping node / Distributed hash table / Chord / Pastry / Peer-to-peer / Sybil attack / B-tree / GiFT / Node / Distributed data storage / Computing / Software

      Limiting Sybil Attacks in Structured P2P Networks Hosam Rowaihy, William Enck, Patrick McDaniel, and Thomas La Porta Department of Computer Science and Engineering Pennsylvania State University University Park, PA 16802

      Add to Reading List

      Source URL: www.enck.org

      Language: English
      10NP-complete problems / Morphisms / Alert correlation / Graph isomorphism / Subgraph isomorphism problem / Matching / Tree / Mathematics / Theoretical computer science / Graph theory

      Learning Attack Strategies from Intrusion Alerts ∗ Peng Ning

      Add to Reading List

      Source URL: discovery.csc.ncsu.edu

      Language: English - Date: 2011-11-09 13:26:02
      UPDATE