Computer network security

Results: 18127



#Item
921JPCERT/CC Internet Threat Monitoring Report[January 1, March 31, 2015]

JPCERT/CC Internet Threat Monitoring Report[January 1, March 31, 2015]

Add to Reading List

Source URL: www.jpcert.or.jp

Language: English - Date: 2015-06-29 20:52:09
922Man-in-the-middle in Tunnelled Authentication Cambridge Security Protocols Workshop, April 2003 N. Asokan, Kaisa Nyberg, Valtteri Niemi Nokia Research Center

Man-in-the-middle in Tunnelled Authentication Cambridge Security Protocols Workshop, April 2003 N. Asokan, Kaisa Nyberg, Valtteri Niemi Nokia Research Center

Add to Reading List

Source URL: asokan.org

Language: English - Date: 2015-04-08 16:31:41
923Microsoft Word - Dokument2

Microsoft Word - Dokument2

Add to Reading List

Source URL: www.kutter-fonds.ethz.ch

Language: English - Date: 2010-05-16 10:11:22
924ITServ Request for VPN Access Every field is mandatory Name: ______________________________________ ID. ___________ Tel. ___________ School/Department/Unit: _________________________Email: _____________________ Period Re

ITServ Request for VPN Access Every field is mandatory Name: ______________________________________ ID. ___________ Tel. ___________ School/Department/Unit: _________________________Email: _____________________ Period Re

Add to Reading List

Source URL: itserv.ait.ac.th

Language: English - Date: 2012-10-23 04:58:00
925State of the States Cyber Crime Consortium 2014 Meeting Recap

State of the States Cyber Crime Consortium 2014 Meeting Recap

Add to Reading List

Source URL: www.search.org

Language: English
926The Top Speed of Flash Worms Stuart Staniford∗ David Moore†  Vern Paxson‡

The Top Speed of Flash Worms Stuart Staniford∗ David Moore† Vern Paxson‡

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:06
927The Effect of Social Influence on Security Sensitivity

The Effect of Social Influence on Security Sensitivity

Add to Reading List

Source URL: www.usenix.org

Language: English
928LinuxTag 2010 Berlin  strongSwan News Prof. Dr. Andreas Steffen  Martin Willi

LinuxTag 2010 Berlin strongSwan News Prof. Dr. Andreas Steffen Martin Willi

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2010-06-11 06:38:12
929Modeling User Search Behavior for Masquerade Detection Malek Ben Salem and Salvatore J. Stolfo Computer Science Department Columbia University New York, USA

Modeling User Search Behavior for Masquerade Detection Malek Ben Salem and Salvatore J. Stolfo Computer Science Department Columbia University New York, USA

Add to Reading List

Source URL: ids.cs.columbia.edu

Language: English - Date: 2011-09-04 10:44:35
930Report from Dagstuhl SeminarWeb Application Security Edited by  Lieven Desmet1 , Martin Johns2 , Benjamin Livshits3 , and

Report from Dagstuhl SeminarWeb Application Security Edited by Lieven Desmet1 , Martin Johns2 , Benjamin Livshits3 , and

Add to Reading List

Source URL: drops.dagstuhl.de

Language: English - Date: 2013-02-18 02:32:49