Automated threat

Results: 22



#Item
11Computing / Imperva / FireEye /  Inc. / Network security / Database activity monitoring / Data security / Threat / Computer network security / Computer security / Cyberwarfare

FireEye Fuel Technology Alliances FireEye and Imperva Automated Data Protection Reduces Downtime and Overall Business Risk Key Benefits

Add to Reading List

Source URL: www.fireeye.kr

Language: English - Date: 2015-05-01 16:57:20
12Cyberwarfare / Application firewall / Imperva / Internet fraud / Denial-of-service attack / Web threat / Database activity monitoring / Web fraud detection / Phishing / Computer network security / Computing / Computer security

Web ThreatRadar Stop Automated Attacks and Web Fraud with Industry-first WAF Security Services Harnessing the power of automation, widespread malware infections, and off-the-shelf hacking toolkits, cybercriminals can eas

Add to Reading List

Source URL: www.edvancesecurity.com

Language: English - Date: 2012-05-04 01:38:57
13Public safety / Privacy Office of the U.S. Department of Homeland Security / Automated Targeting System / U.S. Customs and Border Protection / Secure Flight / United States Department of Homeland Security / National security / Government

DHS/ALL/PIA-051 DHS Data Framework - Interim Process to Address an Emergent Threat

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2015-04-17 12:33:51
14Public safety / Privacy Office of the U.S. Department of Homeland Security / Automated Targeting System / U.S. Customs and Border Protection / Secure Flight / United States Department of Homeland Security / National security / Government

DHS/ALL/PIA-051 DHS Data Framework - Interim Process to Address an Emergent Threat

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2015-04-17 12:33:51
15Computer network security / Abusehelper / Communication software / Threat / Vulnerability / Naukowa i Akademicka Sieć Komputerowa / Security information and event management / Network security / Cyberwarfare / Security / Computer security

Proactive Detection and Automated Exchange of Network Security Incidents Piotr Kijewski NASK / CERT Polska

Add to Reading List

Source URL: www.cert.pl

Language: English - Date: 2013-01-31 07:14:55
16Computing / Antivirus software / Client honeypot / Malware / HoneyMonkey / Shellcode / Honeypot / Microsoft Security Essentials / Threat / Computer network security / Cyberwarfare / Computer security

WebPatrol: Automated Collection and Replay of Web-based Malware Scenarios Kevin Zhijie Chen Guofei Gu

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2012-12-11 01:17:01
17Statistics / Theoretical computer science / Activity recognition / Cognition / Algorithm / Anomaly detection / Reactive planning / Hierarchical task network / Randomized algorithm / Artificial intelligence / Automated planning and scheduling / Applied mathematics

Maritime Threat Detection using Plan Recognition 1 2 Bryan Auslander1, Kalyan Moy Gupta1, & David W. Aha2

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-08-28 12:09:14
18International Multilateral Partnership Against Cyber Threats / Internet / Email / Computing / Knowledge / Department of Defense Cyber Crime Center / Computer crimes / Information sharing / Terminology

Trusted Automated eXchange of Indicator Information — TAXII™ Enabling Cyber Threat Information Exchange TAXII defines a set of services and message exchanges that, when implemented, enable sharing of actionable cybe

Add to Reading List

Source URL: makingsecuritymeasurable.mitre.org

Language: English - Date: 2013-07-08 10:01:54
19Computer network security / Rogue software / Antivirus software / Sunbelt Software / Rogue security software / Counterspy / Spyware / Vulnerability / Threat / Computer security / Malware / Cyberwarfare

Team Cymru Partners with Sunbelt Software to Deliver Advanced Malware Intelligence Sunbelt’s advanced automated malware analysis tools power new service for the cyber security community Clearwater, FL –November 18, 2

Add to Reading List

Source URL: www.team-cymru.org

Language: English - Date: 2010-07-28 10:09:28
20Computing / Imperva / FireEye /  Inc. / Network security / Database activity monitoring / Data security / Threat / Computer network security / Computer security / Cyberwarfare

FireEye Fuel Technology Alliances FireEye and Imperva Automated Data Protection Reduces Downtime and Overall Business Risk Key Benefits

Add to Reading List

Source URL: www.fireeye.com

Language: English - Date: 2014-08-11 22:30:03
UPDATE