Computer network security

Results: 18127



#Item
851Cyberwarfare / Computer security / Computer network security / Cybercrime / National security / Cyber-attack / Denial-of-service attack / Malware / Stuxnet / Botnet / Attack / Spyware

Global Mapping of Cyber Attacks Ghita Mezzour, L. Richard Carley, Kathleen M. Carley 2014 CMU-ISR

Add to Reading List

Source URL: www.casos.cs.cmu.edu

Language: English
852Cryptography / Computer security / Computing / Computer access control / Federated identity / Access control / Computer network security / Electronic authentication / Identity management / Authentication / OpenSSH / Application security

Adaptive Defenses for Commodity Software through Virtual Application Partitioning

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2012-10-05 00:01:36
853Computer security / Computer network security / Vulnerability / Software testing / Vulnerability database / National Vulnerability Database / Zero-day / CVSS / Common Vulnerabilities and Exposures / Attack / Buffer overflow / Social vulnerability

SOFTWARE – PRACTICE AND EXPERIENCE Softw. Pract. ExperPublished online in Wiley Online Library (wileyonlinelibrary.com). DOI: spe.2180 Analysis of operating system diversity for intrusion tolerance Mig

Add to Reading List

Source URL: www.di.fc.ul.pt

Language: English - Date: 2013-01-18 09:24:08
854Computing / Computer security / Computer network security / Security engineering / Cyberwarfare / Intrusion detection system / System administration / Botnet / Computer virus / Malware / Alert correlation / Bro

BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology

Add to Reading List

Source URL: faculty.cs.tamu.edu

Language: English - Date: 2007-05-15 01:33:26
855Computer security / Security / Computer access control / Cybercrime / Identity management / Computer network security / Password / Multi-factor authentication / Phishing / Authentication / Transaction authentication number / LastPass

Security for an age of zero trust A Two-factor authentication:

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2016-01-25 16:20:59
856Software / Computing / Social networking services / Data management / Data security / Personal /  Inc. / Cloud computing / Foursquare / Internet privacy / Android / Location-based service / Mobile app

Privacy, Availability and Economics in the Polaris Mobile Social Network Christo Wilson, Troy Steinbauer, Gang Wang, Alessandra Sala, Haitao Zheng and Ben Y. Zhao Department of Computer Science, U. C. Santa Barbara, Sant

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2011-02-11 14:21:36
857

Iowa State University Department of Electrical and Computer Engineering CprE 537 Wireless Network Security 1 Summary CprE 537 provides an overview of the special issues associated with the security of wireless systems. T

Add to Reading List

Source URL: www.iac.iastate.edu

Language: English - Date: 2014-01-28 12:04:31
    858Computer network security / Virtual private networks / Crypto-anarchism / Internet privacy / Network architecture / Modem

    STEPS TO CONFIGURE VPNoBB IN LINUX

    Add to Reading List

    Source URL: hcraj.nic.in

    Language: English - Date: 2012-09-10 07:44:12
    859Computer network security / Spamming / Cyberwarfare / Cybercrime / Spyware / Salvatore J. Stolfo / Simulation / VM / Computer virus / Hypervisor / Malware / Keystroke logging

    BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection! Brian M. Bowen 1 , Pratap Prabhu 1 , Vasileios P. Kemerlis 1 , Stelios Sidiroglou 2 , Angelos D. Keromytis 1 , and S

    Add to Reading List

    Source URL: ids.cs.columbia.edu

    Language: English - Date: 2011-09-04 10:44:35
    860IEEE 802 / OSI protocols / Computer networking / Units of information / Network architecture / PHY / OSI model / Network packet / Frame / IEEE 802.15 / ZigBee / Transmission Control Protocol

    Phantom Boundaries and Cross-layer Illusions inDigital Radio (Research Report) Travis Goodspeed Straw Hat Security

    Add to Reading List

    Source URL: spw14.langsec.org

    Language: English - Date: 2014-06-12 23:25:59
    UPDATE