CISA

Results: 407



#Item
251CISA / Initialisms

Enrollment Trends College-Wide Enrolled % Growth

Add to Reading List

Source URL: www.napavalley.edu

Language: English - Date: 2014-10-23 18:51:37
252Computer network security / Netfilter / Network address translation / Iptables / IP address / Nat / Transmission Control Protocol / Application-level gateway / Internet / System software / Computing / Software

APPROVAL SHEET Title of Thesis: Experimental evaluation and implementation of the Spread Identity Framework Name of Candidate: Nikhil Dinkar Joshi Master of Science, 2011

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2011-12-05 09:43:00
253American Association of State Colleges and Universities / Association of Public and Land-Grant Universities / Middle States Association of Colleges and Schools / University of Maryland /  Baltimore County / Intrusion detection system / SpamAssassin / Baltimore / Master of Science / Snort / Software / Spam filtering / Spamming

APPROVAL SHEET Title of Thesis: EBIDS-SENLP: A System to Detect Social Engineering Email Using Natural Language Processing

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2012-01-12 13:40:36
254Digital forensics / Outsourcing / Cloud computing security / Computer security / Forensic science / Network forensics / Cloud storage / Service-level agreement / Anti-computer forensics / Computing / Cloud computing / Centralized computing

Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies Josiah Dykstra, Alan T. Sherman Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County {dykstra, sherman}

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2012-01-15 21:10:15
255Election fraud / Election technology / Electronic voting / Punchscan / Electoral fraud / Ballot / Voting system / Vote counting system / End-to-end auditable voting systems / Politics / Electoral systems / Elections

Punchscan in Practice: An E2E Election Case Study Aleks Essex Rick Carback Jeremy Clark

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2010-06-04 12:43:35
256Elections / Electoral systems / Scantegrity / Voting / Punchscan / Voter-verified paper audit trail / Optical scan voting system / Ballot / Help America Vote Act / Politics / Electronic voting / Election fraud

Scantegrity III: Automatic Trustworthy Receipts, Highlighting Over/Under Votes, and Full Voter Verifiability Alan T. Sherman UMBC CDL Russell A. Fink

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2012-01-13 15:12:16
257Electoral systems / Electronic voting / Punchscan / Election fraud / Optical scan voting system / Voting machine / Ballot / University Voting Systems Competition / End-to-end auditable voting systems / Politics / Elections / Election technology

On the Independent Verification of a Punchscan Election Richard T. Carback III Center for Information Security and Assurance, University of Maryland,

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2010-06-04 12:43:29
258Government / Accountability / Punchscan / Electronic voting / ThreeBallot / Ballot / Voting system / Prêt à Voter / End-to-end auditable voting systems / Politics / Electoral systems / Elections

Punchscan with Independent Ballot Sheets: Simplifying Ballot Printing and Distribution with Independently Selected Ballot Halves (extended abstract) Richard T. Carback III∗, Stefan Popoveniuc†, Alan T. Sherman∗‡

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2010-06-04 12:43:23
259Cyberwarfare / Denial-of-service attacks / IP address / Denial-of-service attack / Transmission Control Protocol / Router / Internet / Network architecture / Computing / Computer network security

APPROVAL SHEET Title of Thesis: Spread Identity: A New Dynamic Address Remapping Mechanism for Anonymity and DDoS Defense

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2011-09-08 21:30:12
260Trusted computing / Virtual machines / Windows Server / Trusted Execution Technology / x86 architecture / Trusted Platform Module / Virtual appliance / Hypervisor / Cloud computing / System software / Software / Computing

LNCS[removed]Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2012-01-13 12:57:13
UPDATE