Computer network security

Results: 18127



#Item
881Cyberwarfare / Computing / Computer security / Software maintenance / Software release / Patch / Computer network security / Vulnerability / Common Vulnerabilities and Exposures / Transdermal patch / Computer worm / Shavlik Technologies

Timing the Application of Security Patches for Optimal Uptime Steve Beattie, Seth Arnold, Crispin Cowan, Perry Wagle, and Chris Wright † – WireX Communications, Inc. Adam Shostack – Zero Knowledge Systems, Inc. ABS

Add to Reading List

Source URL: adam.shostack.org

Language: English - Date: 2014-06-11 11:42:33
882Computing / System software / Software / Computer network security / Computer security / Crime prevention / Cryptography / National security / Intrusion detection system / Bro / NetFlow / Internet privacy

Principles for Developing Comprehensive Network Visibility∗ Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver International Computer Science Institute Abstract

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:07
883Cyberwarfare / Computer security / Computing / Computer network security / Hacking / Software testing / Software bugs / Vulnerability / Heartbleed / Zero-day / Cross-site scripting / Security testing

Website Security Statistics Report 2015 About This Report WhiteHat Security’s Website Security Statistics

Add to Reading List

Source URL: info.whitehatsec.com

Language: English - Date: 2016-02-25 05:35:53
884Computer network security / Software-defined networking / Intrusion detection system / OpenFlow / Botnet / Computer security / Deep packet inspection / Malware / Nox / Flow network

MalwareMonitor: An SDN-based Framework for Securing Large Networks Zainab Abaid†‡ , Mohsen Rezvani† and Sanjay Jha† ‡ †

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 17:07:32
885Security / Cyberwarfare / Computing / Smart grid / Computer network security / Computer security / Cryptography / National security / Smart meter / Internet privacy / Privacy policy / National Institute of Standards and Technology

Microsoft Word - Integrity-Security Principles)

Add to Reading List

Source URL: www.smartgrid.gov

Language: English - Date: 2015-02-12 06:56:48
886Computing / Security / Cyberwarfare / Computer security / Computer network security / Cybercrime / National security / Knowledge representation / Situation awareness / Cyberspace / Threat / Common Information Model

SITUATIONAL AWARENESS Gaining an Edge in Cyberspace with Advanced Situational Awareness Vincent Lenders | armasuisse Axel Tanner | IBM Research

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2015-04-23 06:59:54
887Security / Prevention / Data security / Computer security / Computer network security / Cryptography / National security / NIST Special Publication 800-53 / Security controls / Information security / Personally identifiable information / Internet privacy

EXECUTIVE OFFICE OF THE PRESIDENT O F F I C E O F M AN AG E M E N T AN D B U D G E T W ASHINGTON, D.CJune 23, 2006 M-06-16

Add to Reading List

Source URL: www.whitehouse.gov

Language: English - Date: 2006-06-26 16:42:04
888Cryptography / Stream ciphers / Cryptographic protocols / RC4 / Internet Standards / Computer network security / Transport Layer Security / Block cipher mode of operation / Keystream / Wi-Fi Protected Access / E0 / Symmetric-key algorithm

A preliminary version of this paper appears in the proceedings of the USENIX Security SymposiumThis is the full version. On the Security of RC4 in TLS and WPA∗ Nadhem J. AlFardan1 Daniel J. Bernstein2

Add to Reading List

Source URL: tls.mbed.org

Language: English
889Secure communication / Security / Cyberwarfare / Computing / Electronic voting in Estonia / Electronic voting / Computer network security / Cryptographic protocols / Denial-of-service attack / Voting system / Server / Absentee ballot

Security Analysis of the Estonian Internet Voting System Drew Springall† Travis Finkenauer† Zakir Durumeric† Jason Kitcat‡ Harri Hursti Margaret MacAlpine J. Alex Halderman† † University of Michigan, Ann Arb

Add to Reading List

Source URL: aaspring.com

Language: English - Date: 2015-01-16 19:16:47
890Computer network security / Cyberwarfare / Computer security / Computing / Computer worm / Intrusion detection system / Anti-worm / Firewall / Computer network / Malware / Witty / Worm

Worms vs. Perimeters: The Case for Hard-LANs Nicholas Weaver Dan Ellis

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:10
UPDATE