Computer and network surveillance

Results: 80



#Item
1Computer security / Information security operations center / Network management / Surveillance / Quantitative analyst / System on a chip / Business process modeling / Computing / Science and technology / Technology

A Human Capital Model for Mitigating Security Analyst Burnout Sathya Chandran Sundaramurthy Kansas State University

Add to Reading List

Source URL: www.usenix.org

Language: English
2Security / Prevention / National security / Spyware / Cybercrime / Computer security / Cyberwarfare / Cyberspace / Citizen Lab / Cyber spying / GhostNet / Computer and network surveillance

Ronald J. Deibert, Black Code: Inside the Battle for Cyberspace

Add to Reading List

Source URL: blackcodebook.com

Language: English - Date: 2013-12-05 09:48:11
3Computing / File sharing / Concurrent computing / Distributed computing / Network architecture / Peer-to-peer / Telecommunications engineering / Distributed hash table / Social peer-to-peer processes / Overlay network / Computer network / Mesh networking

itDecentralized Communication against Surveillance and Privacy Violation Kalman Graffi

Add to Reading List

Source URL: junior-fellows.gi.de

Language: English - Date: 2016-05-17 12:18:49
4Privacy of telecommunications / Technology / Prevention / National security / Computer network / Telephone tapping / Electronic Communications Privacy Act / Surveillance / Privacy / Internet / Pen register / Lawful interception

IT’S TOO COMPLICATED: THE TECHNOLOGICAL IMPLICATIONS OF IP-BASED COMMUNICATIONS ON CONTENT/NON-CONTENT DISTINCTIONS AND THE THIRD PARTY DOCTRINE Steven M. Bellovin,1 Matt Blaze,2 Susan Landau,3 and Stephanie K. Pell4 F

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2016-06-07 13:58:45
5Avionics / Air traffic control / Warning systems / Computer network security / Aircraft collision avoidance systems / Traffic collision avoidance system / Automatic dependent surveillance  broadcast / Secondary surveillance radar / Computer security / Wireless security / Aviation accidents and incidents / Aviation safety

CyCon_2016_book_sisu.indd

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2016-08-02 08:53:24
6Surveillance / Data security / System administration / Splunk / Cyberwarfare / Computer network security / Computer security / Security operations center / Security / Information security operations center / International Multilateral Partnership Against Cyber Threats

SECURITY PROFESSIONAL SERVICES Security Professional Services Augmenting Security Staff, Addressing Skill Shortages and Optimizing Your Security Operations With Splunk

Add to Reading List

Source URL: www.splunk.com

Language: English - Date: 2016-08-17 08:31:42
7Privacy / Employment / Workplace / Personal life / Computer surveillance / Workplace privacy / Government / Telecommuting / Internet privacy / Computer and network surveillance / Surveillance / Computer surveillance in the workplace

MLA Annotated Bibliography (Orlov) Orlov 1 Anna Orlov Professor Willis English 101

Add to Reading List

Source URL: bcs.bedfordstmartins.com

Language: English - Date: 2009-08-12 10:24:00
8Prevention / Security / Safety / National security / Crime prevention / Law enforcement / Human rights / Mass surveillance / Surveillance / Internet privacy / Computer and network surveillance / Privacy

Union for Democratic Communications: Circuits of Struggle Toronto, ON ABSTRACTS: Friday May:30 am Panel session 1

Add to Reading List

Source URL: udc2015.files.wordpress.com

Language: English - Date: 2015-04-19 22:03:04
9Privacy of telecommunications / Surveillance / Computer network security / Internet privacy / Lawful interception / Tor / Denial-of-service attack / National security / Security / Espionage

Research Brief August 2014 The Citizen Lab Schrodinger’s Cat Video and the Death of Clear-Text

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2015-03-18 14:57:43
10Surveillance / Security / Biometrics / Computer network security / Gait analysis / Orthopedic surgery / Spoofing attack / Gait / Facial recognition system / Locomotion / Medicine / Motion

Can Gait Biometrics be Spoofed?∗ A. Hadid, M. Ghahramani, V. Kellokumpu, M. Pietik¨ainen Center for Machine Vision Research, University of Oulu, Finland J. Bustard & M. Nixon School of Electronics and Computer Science

Add to Reading List

Source URL: www.ee.oulu.fi

Language: English - Date: 2012-04-06 05:12:29
UPDATE