Computer Security Institute

Results: 1676



#Item
281Computer security / Crime prevention / Electronic commerce / National security / Secure communication / Massachusetts Institute of Technology / Cyberwarfare / MIT Sloan School of Management / MIT Computer Science and Artificial Intelligence Laboratory / Security / Technology / Computer network security

SLOAN SCHOOL OF MANAGEMENT Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity (IC)3 SPECIAL INTRODUCTORY OFFER FOR FOUNDING MEMBERS OF (IC)3: Join MIT-(IC)3 as a Founding Member and get the

Add to Reading List

Source URL: ic3.mit.edu

Language: English - Date: 2015-04-14 21:14:47
282Internet protocols / Internet / Computer network security / Virtual private networks / Internet standards / Point-to-Point Tunneling Protocol / Layer 2 Tunneling Protocol / OpenVPN / Internet Protocol Control Protocol / Computing / Tunneling protocols / Network architecture

Npppd: easy vpn with OpenBSD Giovanni Bechis Institute of Biostructures and Bioimaging, Napoli, Italy

Add to Reading List

Source URL: www.snb.it

Language: English - Date: 2013-04-06 13:07:24
283Computer security / World Trade Center / Public administration / Government / Economic policy / Standards organizations / Gaithersburg /  Maryland / National Institute of Standards and Technology

2003 Annual Report THE NIST VISITING COMMITTEE ON ADVANCED TECHNOLOGY U.S. DEPARTMENT OF COMMERCE

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-03-03 15:13:10
284Metrology / Computer security / Public administration / NIST Enterprise Architecture Model / Government / Economic policy / Standards organizations / Gaithersburg /  Maryland / National Institute of Standards and Technology

VISITING COMMITTEE ON ADVANCED TECHNOLOGY

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-03-03 15:13:10
285Technology / Web applications / Web development / Key management / Public-key cryptography / Electronic business / Information security / Digital signature / Public key certificate / Cryptography / Computing / Electronic commerce

End User Acceptance of Security Technology for Electronic Commerce Dale Whinnett Albert-Ludwigs-University Freiburg, Germany Institute for Computer Science and Social Studies

Add to Reading List

Source URL: www.semper.org

Language: English - Date: 2011-10-26 07:11:08
286USENIX Annual Technical Conference / USENIX / System software / Internet censorship / Deep packet inspection / Citizen Lab / International Computer Science Institute / Information technology management / Computer network security / Computing / System administration

Announcement and Call for Papers www.usenix.org/foci15/cfp 5th USENIX Workshop on Free and Open Communications

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-05-04 22:53:29
287Cryptography / System administration / Unix / Password / Salt / Shadow password / Crypt / Password strength / Passwd / System software / Computer security / Software

‘‘Foiling the Cracker’’: A Survey of, and Improvements to, Password Security† Daniel V. Klein Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15217

Add to Reading List

Source URL: geodsoft.com

Language: English - Date: 2003-11-09 11:25:55
288Cyberwarfare / Snort / Intrusion detection system / Evasion / Transmission Control Protocol / Internet protocol suite / Bro / Computer network security / Software / Computer security

Detecting Network Intruders in Real Time Vern Paxson ICSI Center for Internet Research (ICIR) International Computer Science Institute and

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2003-05-06 03:43:28
289Network switch / Computing / Network architecture / Data / Computer network security / Cyberwarfare / Internet standards / Network performance / Transmission Control Protocol / Throughput

A Preliminary Analysis of TCP Performance in an Enterprise Network∗ Boris Nechaev† , Mark Allman‡ , Vern Paxson‡ , Andrei Gurtov† † Helsinki Institute for Information Technology, ‡ International Computer Sc

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2010-04-19 15:33:32
290Computer security / Data mining / Statistics / Spamming / Anomaly detection / Intrusion detection system / Network intrusion detection system / Misuse detection / Snort / Computer network security / Data security / Computing

Outside the Closed World: On Using Machine Learning For Network Intrusion Detection Robin Sommer International Computer Science Institute, and Lawrence Berkeley National Laboratory

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2010-03-05 21:14:30
UPDATE