Attacker

Results: 79



#Item
1Human behavior / Violence / Abuse / Crimes / Rape / Violence against women / Sexual abuse / Domestic violence / Sexual assault / Address confidentiality program / Stalking

Survivors of assault and abuse often live in constant fear. Their days are filled with anxiety, knowing that their abuser or attacker might strike again. Sadly, this is a scenario many Iowans face every day. More than 3,

Add to Reading List

Source URL: safeathome.iowa.gov

Language: English - Date: 2018-02-17 07:18:03
2Computing / Fingerprinting algorithms / Cryptography / Identification / Internet privacy / Biometrics / Computer network security / Device fingerprint / Internet fraud / Public key fingerprint / Fingerprint / Tor

Poster: Identify and Track Web Attacker Based on Deceptive Technology and Browser Fingerprint Heyang Lv1 Binxing Fang2 Xiang Cui3,4 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 06:46:30
3Internet architecture / Computing / Information and communications technology / Network architecture / Routing / IP routing / Computer network / Router / Source routing / Wireless ad hoc network / Control plane / Link-state routing protocol

Toward a Taxonomy and Attacker Model for Secure Routing Protocols Matthias Hollick Cristina Nita-Rotaru

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
4

Static Detection of Packet Injection Vulnerabilities – A Case for Identifying Attacker-controlled Implicit Information Leaks Qi Alfred Chen, Zhiyun Qian† , Yunhan Jack Jia, Yuru Shao, Z. Morley Mao University of Mich

Add to Reading List

Source URL: www.cs.ucr.edu

Language: English - Date: 2015-10-13 17:35:43
    5

    Device attacker models: fact and fiction Jiangshan Yu and Mark D. Ryan School of Computer Science University of Birmingham {jxy223, m.d.ryan}@cs.bham.ac.uk

    Add to Reading List

    Source URL: www.cs.bham.ac.uk.

    Language: English - Date: 2015-12-01 05:25:58
      6

      What is secure compilation? Security goals and attacker models Cătălin Hrițcu Inria Paris 1

      Add to Reading List

      Source URL: prosecco.gforge.inria.fr

      Language: English - Date: 2018-05-14 13:24:16
        7

        Hybrid Monitoring of Attacker Knowledge Frédéric Besson, Nataliia Bielova and Thomas Jensen Inria, France Abstract—Enforcement of noninterference requires proving that an attacker’s knowledge about the initial

        Add to Reading List

        Source URL: people.rennes.inria.fr

        Language: English - Date: 2016-07-18 05:18:35
          8

          Dig Deeper Since 2012, Trail of Bits has helped secure some of the world’s most targeted organizations and products. We combine high-end security research with a real-world attacker mentality to reduce risk and fortify

          Add to Reading List

          Source URL: www.trailofbits.com

          - Date: 2016-11-14 13:55:52
            9

            Example Risk Reduction Overview: Giving users access to a network with sensitive data over the internet. This example is purely hypothetical and does not reflect an existing design. I2: An attacker intercepts the communi

            Add to Reading List

            Source URL: rro.sourceforge.net

            - Date: 2015-01-13 17:21:06
              10

              Sparring Tips 1. Have fun. 2. Use V-stepping to dodge kicks or punches without retreating, then counterpunch to attacker’s side or round-kick his stomach. 3. Always attack with combinations of punches and kicks. Never

              Add to Reading List

              Source URL: www.minrec.org

              Language: English - Date: 2010-07-18 16:45:50
                UPDATE