Computer network security

Results: 18127



#Item
911Interest-Based Access Control for Content-Centric Networks ∗ Cesar Ghali  Marc A. Schlosberg

Interest-Based Access Control for Content-Centric Networks ∗ Cesar Ghali Marc A. Schlosberg

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-10-01 13:18:45
912AbuseSA  Build a More Resilient World KEY ABUSESA FEATURES: • Automated Data Collection

AbuseSA Build a More Resilient World KEY ABUSESA FEATURES: • Automated Data Collection

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:12
913Insider Threats  Designing Host and Network Sensors to Mitigate the Insider Threat Insider attacks—that is, attacks by users with privileged

Insider Threats Designing Host and Network Sensors to Mitigate the Insider Threat Insider attacks—that is, attacks by users with privileged

Add to Reading List

Source URL: ids.cs.columbia.edu

Language: English - Date: 2011-09-04 10:44:35
914strongSwan The new IKEv2 VPN Solution Andreas Steffen  Copyright © 2007 by Andreas Steffen

strongSwan The new IKEv2 VPN Solution Andreas Steffen Copyright © 2007 by Andreas Steffen

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2007-05-26 10:12:50
915THE DUKES 7 years of Russian cyberespionage TLP: WHITE This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the Dukes, a well-resourced, highly

THE DUKES 7 years of Russian cyberespionage TLP: WHITE This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the Dukes, a well-resourced, highly

Add to Reading List

Source URL: www.f-secure.com

Language: English - Date: 2015-09-17 01:34:34
916POSTER: Security By Mobility in Location and Track Verification Matthias Schäfer† †  Daniel S. Berger†

POSTER: Security By Mobility in Location and Track Verification Matthias Schäfer† † Daniel S. Berger†

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2015-08-08 10:29:40
917HotSwap: Correct and Efficient Controller Upgrades for Software-Defined Networks Laurent Vanbever Joshua Reich

HotSwap: Correct and Efficient Controller Upgrades for Software-Defined Networks Laurent Vanbever Joshua Reich

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-06-13 09:26:16
918Computer security / Computer network security / Cryptography / E-commerce / Secure communication / Cross-site request forgery / SQL injection / Password / Salt / Transport Layer Security / Application security / OWASP

Application Security Checklist V1.0 Document Audience Application Developers

Add to Reading List

Source URL: security.uci.edu

Language: English - Date: 2016-02-23 10:01:01
919Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS David Naylor? , Kyle Schomp† , Matteo Varvello‡ , Ilias Leontiadis‡ , Jeremy Blackburn‡ , Diego Lopez‡ , Konstantina Papagiannaki‡ ,

Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS David Naylor? , Kyle Schomp† , Matteo Varvello‡ , Ilias Leontiadis‡ , Jeremy Blackburn‡ , Diego Lopez‡ , Konstantina Papagiannaki‡ ,

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2015-07-29 16:55:02
920In Brief  WideAngle Managed Security Services (MSS) The threat landscape is evolving quickly – and Managed Security Services (MSS) can be

In Brief WideAngle Managed Security Services (MSS) The threat landscape is evolving quickly – and Managed Security Services (MSS) can be

Add to Reading List

Source URL: www.nttcomsecurity.com

Language: English - Date: 2015-07-14 05:58:47