Computer Security Institute

Results: 1676



#Item
561Information / LOBSTER / Computer network security / Deep packet inspection / Traffic classification / Peer-to-peer / Computer network / Communications protocol / Computer networking / Computing / Data

When AppMon met Stager Nikos Nikiforakis, Demetres Antoniades, Evangelos P. Markatos, Sotiris Ioannidis Institute of Computer Science Foundation for Research & Technology – Hellas {nikifor,danton,markatos,sotiris}@ics.

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-01-01 13:06:14
562Risk management / Actuarial science / Evaluation / Reliability engineering / Risk assessment / Safety engineering / Vulnerability / Computer security / United Nations Interregional Crime and Justice Research Institute / Risk / Security / Management

Risk Benefit Assessment Worksheet for Emerging or Enabling Technologies Adapted from National and Transnational Security Implications of Big Data in the Life Sciences, A Joint AAAS-FBI-UNICRI Project Technology [scenario

Add to Reading List

Source URL: www.aaas.org

Language: English - Date: 2014-12-03 09:52:16
563Computer network security / Computer security / National security / Secure communication / National Cybersecurity Center / Public safety / Cyber Secure Institute / Cyberwarfare / Security / United States Department of Homeland Security

THE CENTER GUIDES BUSINESSES TO STRONGER CYBERSECURITY PRACTICES. The National Cybersecurity Center of Excellence (NCCoE) at the National

Add to Reading List

Source URL: nccoe.nist.gov

Language: English - Date: 2014-12-30 09:32:45
564Cyberwarfare / Computer security / Transmission Control Protocol / Network protocols / Denial-of-service attack / NetBIOS / SYN flood / Internet Protocol / Port / Computer network security / Denial-of-service attacks / Computing

Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks Marc K¨uhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz Horst G¨ortz Institute for IT-Security, Ruhr-University Bochum, Germany Abstrac

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-01-15 11:58:11
565Network architecture / Denial-of-service attacks / Internet / Cyberwarfare / Internet standards / Denial-of-service attack / Transmission Control Protocol / NetBIOS / Network Time Protocol / Computing / Internet protocols / Computer network security

Exit from Hell? Reducing the Impact of Amplification DDoS Attacks Marc K¨uhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz Horst G¨ortz Institute for IT-Security, Ruhr-University Bochum Abstract Amplification vu

Add to Reading List

Source URL: syssec.rub.de

Language: English - Date: 2014-07-23 03:58:14
566Computer security / Cyberwarfare / COSIC / Security management / International Multilateral Partnership Against Cyber Threats / Computer crimes / Security / Crime

Supported by Cyber Security in the Financial Industry The SWIFT Institute and the KU Leuven will host a one day conference focusing on cyber security issues impacting the global financial industry. Today’s cyber threa

Add to Reading List

Source URL: swiftinstitute.org

Language: English - Date: 2014-11-14 05:00:51
567Cyberwarfare / Computer security / Transmission Control Protocol / Network protocols / Denial-of-service attack / NetBIOS / SYN flood / Internet Protocol / Port / Computer network security / Denial-of-service attacks / Computing

Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks Marc K¨uhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz Horst G¨ortz Institute for IT-Security, Ruhr-University Bochum, Germany Abstrac

Add to Reading List

Source URL: syssec.rub.de

Language: English - Date: 2014-07-23 03:55:46
568Security / Computer security / Technology / Computer network security / Paris Institute of Technology / Télécom ParisTech / Institut Eurécom / Application security / Sophia Antipolis / Grandes écoles / Education in France / France

IT MSc 2013 ParisTech - Communications and Computer Security

Add to Reading List

Source URL: www.telecom-paristech.fr

Language: English - Date: 2013-09-06 05:19:19
569International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / Stanford University / Cyber-security regulation / Massachusetts Institute of Technology / Think tank / Higher education / Academia / Technology / Association of American Universities / Cyberwarfare / Computer crimes

Special Cyber Initiative Grants Memo THE WILLIAM AND FLORA HEWLETT FOUNDATION Memorandum Date: November 4, 2014

Add to Reading List

Source URL: www.hewlett.org

Language: English - Date: 2014-12-03 14:45:30
570Computer security / Crime prevention / National security / Computer network security / PricewaterhouseCoopers / Information security / Industrial espionage / Organized crime / Risk management / Security / Public safety / Business

www.pwc.com/ca/cyber-resilience Financial Management Institute of Canada (fmi*igf) Cyber Resilience

Add to Reading List

Source URL: www.fmi.ca

Language: English - Date: 2014-12-09 17:06:46
UPDATE