Computer Security Institute

Results: 1676



#Item
31Internet privacy / Computing / Privacy / HTTP cookie / Personally identifiable information / Computer security / Government / P3P

Privacy Policy Privacy Statement Thanks for visiting website of Indian Institute of Management, Ahmedabad (IIMA). IIMA understands that the privacy of its users is important. Information collected on http://www.iimahd.er

Add to Reading List

Source URL: www.iima.ac.in

Language: English - Date: 2011-06-15 07:09:42
32Malware / Computing / Computer network security / Multi-agent systems / Spamming / Cyberwarfare / Computer security / Malware analysis / Botnet

Impeding Automated Malware Analysis Paul Royal College of Computing Georgia Institute of Technology

Add to Reading List

Source URL: countermeasure2012.com

Language: English - Date: 2012-11-01 08:16:33
33Computer access control / Computer security / Computing / Security token / Multi-factor authentication / Authentication / RSA SecurID / Mutual authentication / OAuth / OpenID / Electronic authentication / Extensible Authentication Protocol

Bring Your Own Device For Authentication (BYOD4A) – The Xign–System Norbert Pohlmann . Markus Hertlein . Pascal Manaras Institute for Internet-Security Westphalian University of Applied Sciences {pohlmann | hertlein

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-11-20 14:35:18
34Security / Computer security / Cyberwarfare / Vulnerability / Web application firewall / Application security / Application firewall

The Increasing Risk to Enterprise Applications Sponsored by Prevoty Independently conducted by Ponemon Institute LLC Publication Date: November 2015

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2016-08-18 22:09:36
35Security / Access control / Identity management / Computer security / Computer access control / Authorization / User / XACML

Producing Hook Placements to Enforce Expected Access Control Policies No Author Given No Institute Given Abstract. Many security-sensitive programs manage resources on behalf of mutually distrusting clients. To control

Add to Reading List

Source URL: www.cse.psu.edu

Language: English - Date: 2014-11-18 10:12:45
36Computing / Computer network security / Cyberwarfare / Computer security / Multi-agent systems / Spamming / Intrusion detection system / Malware / Computer virus / Botnet / Alert correlation / Infection

BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology

Add to Reading List

Source URL: www.cyber-ta.org

Language: English - Date: 2007-06-29 16:14:13
37Prevention / Security / Safety / Computer security / National security / Data security / Cryptography / Information security / Risk / Threat / Resilience / Human security

Security Metrics and Security Investment Models Rainer B¨ohme International Computer Science Institute, Berkeley, California, USA

Add to Reading List

Source URL: informationsecurity.uibk.ac.at

Language: English - Date: 2016-07-15 15:37:41
38Cryptography / Microsoft Windows / Computing / Computer network security / Authentication protocols / Kerberos / BitLocker / Password / Email

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
39Password / Security / Point and click

The Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Camera-Ready Submission guidelines to ASSYST Submission Instructions to ASSYST – ICST Paper Submission and Review System 1. Reg

Add to Reading List

Source URL: electronic-health.org

Language: English - Date: 2010-09-27 05:44:17
40Software / Computing / Computer network security / Cloud clients / Portable software / Web browsers / Hypertext Transfer Protocol / Browser security / HTTP cookie / JavaScript / Google Chrome / Browser extension

Run-time Monitoring and Formal Analysis of Information Flows in Chromium Lujo Bauer Shaoying Cai? Limin Jia Timothy Passaro Michael Stroucken Carnegie Mellon University ? Institute for Infocomm Research

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-01-24 20:37:43
UPDATE