Computer Security Institute

Results: 1676



#Item
71Computer network security / Cybercrime / National security / Computer security / Cryptography / Threat

INNOVATION AND TECHNOLOY FUND Post Project Evaluation Form for ITSP Projects Undertaken by Designated Local Public Research Institute Notes for Completion This evaluation form comprises two parts which should be complet

Add to Reading List

Source URL: www.itf.gov.hk

Language: English - Date: 2016-06-23 05:47:04
72Cryptography / Computer network security / Computer security / Cyberwarfare / National security / Secure communication / Application security / Communications security / Wireless security / Software-defined radio / Advanced Learning and Research Institute / Software security assurance

NRL BAA Announcement # HIGH ASSURANCE ENGINEERING AND COMPUTING The Center for High Assurance Computer Systems of the Naval Research Laboratory (NRL) is seeking white papers for innovative research, advanced sys

Add to Reading List

Source URL: heron.nrl.navy.mil

Language: English - Date: 2016-02-17 10:17:54
73Computer security / Cyberwarfare / Control engineering / Cybercrime / National security / SANS Institute / SCADA / Critical infrastructure protection / Operational Technology / Information security operations center / Cyber-attack / Stuxnet

PDF Document

Add to Reading List

Source URL: ics.sans.org

Language: English - Date: 2015-12-09 15:17:34
74Piscataway /  New Jersey / Internet in China / China Internet Network Information Center / Malware / Zhongguancun / Internet / Computer security / Institute of Electrical and Electronics Engineers

Version: 29 June Contents

Add to Reading List

Source URL: internetinitiative.ieee.org

Language: English - Date: 2016-07-27 10:33:08
75Computer network security / Multi-agent systems / Spamming / Botnets / Cyberwarfare / Command and control / Denial-of-service attack / ZeroAccess botnet / Communications protocol / NetFlow / Kelihos botnet / Transmission Control Protocol

CoCoSpot: Clustering and Recognizing Botnet Command and Control Channels using Traffic Analysis1 Christian J. Dietricha,c , Christian Rossowa,b , Norbert Pohlmanna a Institute for Internet Security, University of Applie

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:17:15
76Law enforcement in the United States / United States intelligence agencies / Criminal records / Clarksburg /  West Virginia / Criminal investigation / FBI Criminal Justice Information Services Division / Computer security / Federal Bureau of Investigation / United States Department of Homeland Security / Cloud computing / IJIS Institute / Homeland security

About Datamaxx Bringing the Power of Information to Protect Our Nation How can we improve the process of accessing and sharing “mission critical” information for those who protect and serve our nation? That was the q

Add to Reading List

Source URL: www.datamaxx.com

Language: English - Date: 2015-01-21 10:29:20
77Computer network security / Distance education / Educational psychology / Educational technology / Information technology / Internet access / Internet / Computer security / Computer network / Gogte Institute of Technology

HOOSICK FALLS CENTRAL SCHOOL DISTRICT Instructional Technology Plan

Add to Reading List

Source URL: www.hoosickfallscsd.org

Language: English - Date: 2016-05-20 07:58:27
78Network management / Internet protocols / Computer network security / Network performance / NetFlow / IP Flow Information Export / Measuring network throughput / Traffic flow / Communications protocol / Packet analyzer / Pcap / Transport layer

Aggregation of Network Protocol Data Near its Source Marcel Fourn´e, Kevin Stegemann, Dominique Petersen, and Norbert Pohlmann Institute for Internet Security, Westf¨ alische Hochschule, University of Applied Sciences,

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 12:55:58
79Internet protocols / Cryptography / Schengen Routing / Internet Standards / Computer network security / Internet privacy / Schengen Area / Internet / Border Gateway Protocol / Routing / European integration / IPsec

Secure communication and digital sovereignty in Europe Norbert Pohlmann . Michael Sparenberg . Illya Siromaschenko . Kilian Kilden Institute for Internet Security – if(is) Westfälische Hochschule, Gelsenkirchen

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-12-20 07:45:16
80Computer network security / Authentication protocols / BitLocker / Disk encryption / Windows 7 / Windows Server / Password / Kerberos

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
UPDATE