Computer security conference

Results: 514



#Item
281Internet / Network architecture / Internet standards / Computer network security / Network protocols / Denial-of-service attack / Network Time Protocol / Transmission Control Protocol / NetBIOS / Computing / Internet protocols / Denial-of-service attacks

Exit from Hell? Reducing the Impact of Amplification DDoS Attacks Marc Kührer, Thomas Hupperich, Christian Rossow, and Thorsten Holz, Ruhr-University Bochum https://www.usenix.org/conference/usenixsecurity14/technical-

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-01-15 03:35:06
282Computer security / Cyberwarfare / COSIC / Security management / International Multilateral Partnership Against Cyber Threats / Computer crimes / Security / Crime

Supported by Cyber Security in the Financial Industry The SWIFT Institute and the KU Leuven will host a one day conference focusing on cyber security issues impacting the global financial industry. Today’s cyber threa

Add to Reading List

Source URL: swiftinstitute.org

Language: English - Date: 2014-11-14 05:00:51
283Peace / Conference Board of the Mathematical Sciences / Computer crime / International relations / National security / Cyberwarfare / Military technology / Confidence-building measures in South America / Confidence and security-building measures / Diplomacy / Peacekeeping

Atlantic Council BRENT SCOWCROFT CENTER ON INTERNATIONAL SECURITY CONFIDENCE-BUILDING MEASURES IN CYBERSPACE

Add to Reading List

Source URL: www.atlanticcouncil.org

Language: English - Date: 2014-11-07 11:25:43
284United States Department of Homeland Security / Civil defense / Infrastructure / Security engineering / Critical infrastructure / Resilience / Homeland security / Computer security / National security / Public safety / Security

Homeland Security Conference 2014

Add to Reading List

Source URL: www.masterpiece.dk

Language: English - Date: 2014-09-29 04:49:19
285Malware / Computer network security / RSA numbers / Cryptography / EMC Corporation / RSA

FINALISTS ANNOUNCED FOR RSA CONFERENCE’S INNOVATION SANDBOX PROGRAM Annual Innovation Sandbox Honors Information Security’s Next Generation of Superstars SANTA CLARA, Calif. – Jan. 29, 2013 – RSA® Conference, th

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2013-06-04 12:13:08
286Computing / Input/output / Computational linguistics / User interface techniques / Computer keyboard / Linear classifier / Typing / Speech recognition / Supervised learning / Machine learning / Statistics / Human–computer interaction

In Proceedings of the 12th ACM Conference on Computer and Communications Security, November 2005, pp[removed]Keyboard Acoustic Emanations Revisited Li Zhuang, Feng Zhou, J. D. Tygar University of California, Berkeley {

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2006-02-11 16:25:13
287Public safety / Electronic commerce / Cybernetics / Systems theory / Computer security / Information security / Multilevel security / Software engineering / System / Security / Crime prevention / National security

PANEL STATEMENT Nontechnical Issues in Achieving Dependably Secure Systems and Networks National Information Systems Security Conference, Crystal City, Virginia, 18-21 October 1999 Chairman: Peter G. Neumann, Computer Sc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
288Crime prevention / Computer security / Law enforcement / National Security Agency / Access control / United States Environmental Protection Agency / Surveillance / Security / National security / Public safety

Agency Roles and Access Control New AQS Security Model Agency Access Control National Ambient Air Monitoring Conference August 2014

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2014-09-12 16:22:00
289Content-control software / World Wide Web / Websense / International Multilateral Partnership Against Cyber Threats / Cyberwarfare / U.S. Securities and Exchange Commission / Technology / Computer network security / Finjan / Computing

Finjan Holdings, Inc. NASDAQ: FNJN Rodman & Renshaw 16th Annual Global Investor Conference

Add to Reading List

Source URL: content.stockpr.com

Language: English - Date: 2015-01-06 15:07:42
290Military technology / Cyberwarfare / Computer security / Speaker of the House of Commons / War / Security / Electronic warfare / Hacking

6 CONFERENCE PROGRAM Tuesday, November 11

Add to Reading List

Source URL: www.api.org

Language: English - Date: 2014-11-04 13:00:16
UPDATE