Computer network security

Results: 18127



#Item
841Computing / Cyberwarfare / Botnets / Computer network security / Multi-agent systems / Spamming / Concurrent computing / Domain generation algorithm / Malware / Sality / Denial-of-service attack / Computer virus

AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis Zhaoyan Xu Antonio Nappa

Add to Reading List

Source URL: faculty.cs.tamu.edu

Language: English - Date: 2014-09-29 02:03:52
842Computer security / Computing / Security / Computer network security / Hacking / Global Information Assurance Certification / SANS Institute / White hat / Penetration test / Professional certification / Security hacker

Penetration Testing & Ethical Hacking Graduate Certificate The SANS Technology Institute’s post-baccalaureate certificate program in Penetration Testing & Ethical Hacking is based entirely upon four courses already ava

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2015-08-20 16:00:38
843Wireless networking / Technology / Emerging technologies / Security / Computer network security / Driving / Vehicular communication systems / Computer security / Internet privacy / Wireless ad hoc network / Privacy / Autonomous car

Photo or figure (optional)

Add to Reading List

Source URL: www.strc.ch

Language: English - Date: 2008-12-12 12:19:57
844Wireless networking / Computing / Network management / Network architecture / Wireless ad hoc network / Mobile ad hoc network / Routing / Zone Routing Protocol / B.A.T.M.A.N.

ICALP’07 & LICS’07 Workshop FCS-ARSPA’07 Joint Workshop on Foundations of Computer Security and

Add to Reading List

Source URL: profs.sci.univr.it

Language: English - Date: 2007-06-23 06:24:22
845Computing / Software / Technology / Cyberwarfare / Social media / Cybercrime / Twitter / Computer network security / Cozy Bear / Hashtag / Computer security / Botnet

v1-04 [преобразованный]

Add to Reading List

Source URL: www2.fireeye.com

Language: English - Date: 2016-03-02 08:11:14
846Identity management / Computer access control / Computer network security / Authentication / Notary / Packaging / Knowledge-based authentication / Layered security / Analytics / Identity verification service / LexisNexis

White Paper The Role of Knowledge Based Authentication (KBA) In Identity Proofing Knowledge Based Authentication [KBA]

Add to Reading List

Source URL: lexisnexis.com

Language: English - Date: 2014-10-15 08:44:07
847Software / Computing / Cyberwarfare / Computer network security / Computer security / Warez / Zero-day / Vulnerability database / Vulnerability / Common Vulnerabilities and Exposures / NetBSD / Solaris

OS Diversity for Intrusion Tolerance: Myth or Reality? Miguel Garcia∗ , Alysson Bessani∗ , Ilir Gashi† , Nuno Neves∗ and Rafael Obelheiro‡ ∗ LaSIGE, University of Lisbon, Faculty of Sciences – Lisbon, Portu

Add to Reading List

Source URL: www.di.fc.ul.pt

Language: English - Date: 2011-04-15 13:02:34
848Computing / Security / Humancomputer interaction / Automatic identification and data capture / Computational linguistics / Speech processing / Computer network security / Computer accessibility / Speech recognition / Speaker recognition / Biometrics / Spoofing attack

Human vs Machine Spoofing Detection on Wideband and Narrowband Data Mirjam Wester1 , Zhizheng Wu1 , Junichi Yamagishi1,2 1 The Centre for Speech Technology Research, The University of Edinburgh, UK 2

Add to Reading List

Source URL: www.cstr.ed.ac.uk

Language: English - Date: 2015-09-29 11:06:25
849Computer network security / Security / Cyberwarfare / Decoy / Salvatore J. Stolfo / Honeypot / Computer security

Monitoring Technologies for Mitigating Insider Threats Brian M. Bowen, Malek Ben Salem, Angelos D. Keromytis, Salvatore J. Stolfo, Department of Computer Science Columbia University August 21,

Add to Reading List

Source URL: ids.cs.columbia.edu

Language: English - Date: 2011-09-04 10:44:36
850

A National Early Warning Capability Based on a Network of Distributed Honeypots Cristine Hoepers, Klaus Steding-Jessen, Luiz E. R. Cordeiro, Marcelo H. P. C. Chaves NIC BR Security Office – NBSO Brazilian Computer Emer

Add to Reading List

Source URL: www.cert.br

Language: English - Date: 2010-08-13 12:19:32
    UPDATE