Computer Security Institute

Results: 1676



#Item
201Content-control software / Information society / Internet censorship / Privacy / Censorship / International Institute of Social Studies / Internet / Freedom House / MATIS Group / Technology / Digital media / Computer network security

Society for International Development – Netherlands Chapter (SIDNL) presents In the Series ‘New Spaces for International Engagement’: ‘Internet, the Last Bastion of Unlimited Freedom?’ Tuesday 17 March 2015 San

Add to Reading List

Source URL: sidnl.org

Language: English - Date: 2015-02-25 06:10:14
202Malware / Shellcode / Software bugs / Polymorphic code / Buffer overflow / Arbitrary code execution / Self-modifying code / Metasploit Project / Forth / Cyberwarfare / Computer security / Computing

Network-Level Polymorphic Shellcode Detection Using Emulation Michalis Polychronakis1 , Kostas G. Anagnostakis2 , and Evangelos P. Markatos1 1 Institute of Computer Science, Foundation for Research & Technology – Hell

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-05-02 06:32:56
203National security / Crime prevention / Computer security / Electronic commerce / Institute for Transportation and Development Policy / Proactivity / International Multilateral Partnership Against Cyber Threats / Insider / Transport / Security / Computer network security

Proactive Compliance for Insider Threat Protection By Larry Knutsen, co-founder, Strongbox Cyber Solutions LLCwww.strongboxcybersolutions.com

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:34
204Military industry / Crime prevention / National security / Military science / International Traffic in Arms Regulations / Computer security / Security / Defense Security Cooperation Agency / Foreign Military Sales

The Management of Security Cooperation Defense Institute of Security Assistance Management 2475 K Street, Building 52 Wright-Patterson Air Force Base, Ohio The Thirty-Fourth Edition June 2015

Add to Reading List

Source URL: www.disam.dsca.mil

Language: English - Date: 2015-05-05 14:09:41
205Technical communication / Security Content Automation Protocol / Extensible Configuration Checklist Description Format / National Institute of Standards and Technology / HTML / XML / Plaintext / Uniform resource identifier / Computing / Computer security / Markup languages

Draft NISTIR 8058, Security Content Automation Protocol (SCAP) Version 1.2 Content Style Guide: Best Practices for Creating and Maintaining SCAP 1.2 Content

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-01 09:44:02
206Computer security / NIST Special Publication 800-53 / National Institute of Standards and Technology / International Multilateral Partnership Against Cyber Threats / Security Assertion Markup Language / OASIS / Security / Computing / Computer crimes

PDF Document

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2014-04-10 12:00:00
207Ring theory / Finite fields / Theoretical computer science / Diffie–Hellman problem / XTR / Polynomial ring / Algorithm / Ring / Naor-Reingold Pseudorandom Function / Abstract algebra / Algebra / Mathematics

Lower Bounds on Black-Box Ring Extraction Tibor Jager and Andy Rupp , Horst G¨ ortz Institute for IT Security Ruhr-University Bochum, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-30 10:17:55
208National security / Crime prevention / Computer security / Electronic commerce / Institute for Transportation and Development Policy / Proactivity / International Multilateral Partnership Against Cyber Threats / Insider / Transport / Security / Computer network security

Proactive Compliance for Insider Threat Protection By Larry Knutsen, co-founder, Strongbox Cyber Solutions LLCwww.strongboxcybersolutions.com

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 07:38:51
209Universal composability / Secure multi-party computation / Information-theoretic security / Zero-knowledge proof / Communications protocol / Actor model / Cryptography / Cryptographic protocols / Secure two-party computation

Information-Theoretically Secure Protocols and Security Under Composition∗ Eyal Kushilevitz† Department of Computer Science Technion Israel Institute of Technology Haifa 32000, Israel.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-20 09:14:45
210Karlsruhe Institute of Technology / Computing / Request Tracker / Internet governance / Technology / Cyber security and countermeasure / Carnegie Mellon University / Computer emergency response team / CERT Group of Companies

CERT Description as per RfC 2350 Tobias Dussa COMPUTER EMERGENCY RESPONSE TEAM

Add to Reading List

Source URL: www.cert.kit.edu

Language: English - Date: 2013-11-21 10:38:00
UPDATE