Computer security software

Results: 11097



#Item
1Computer architecture / System software / Operating system kernels / Linux kernel / Monolithic kernels / Kernel / Loadable kernel module / Protection ring / Operating system / Mach / Rootkit / Mandatory access control

Poster: (SF)2 I - Structure Field Software Fault Isolation Spyridoula Gravani, Zhuojia Shen, John Criswell Department of Computer Science, University of Rochester Email: {sgravani, zshen10, criswell}@cs.rochester.edu Ab

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 06:12:20
2System software / Computing / Utility software / Computer network security / Computer security / Configuration management / Network architecture / Software-defined networking / Intrusion detection system / Snort / OpenFlow / Traffic flow

Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks Sunghwan Kim, Seunghyun Yoon, and Hyuk Lim School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technol

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 15:46:40
3

Virginia Tech Department of Computer Science Postdoctoral researcher Seek one or two postdoctoral researchers who are interested in the use of system engineering and data analytics to ensure system and software security.

Add to Reading List

Source URL: people.cs.vt.edu

Language: English - Date: 2017-06-29 15:14:44
    4

    Empowering Mobile Software Agents Volker Roth? Fraunhofer Institute for Computer Graphics Dept. Security Technology Fraunhoferstr. 5, 64283 Darmstadt, Germany

    Add to Reading List

    Source URL: www.volkerroth.com

    Language: English - Date: 2007-11-23 00:00:49
      5

      IMPROVING SOFTWARE SECURITY WITH PRECISE STATIC AND RUNTIME ANALYSIS A DISSERTATION SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE

      Add to Reading List

      Source URL: www.doc.ic.ac.uk

      Language: English - Date: 2017-01-10 09:15:12
        6

        A Security Domain Model for Static Analysis and Verification of Software Programs Alan B. Shaffer Naval Postgraduate School Computer Science Dept Monterey, CA, USA

        Add to Reading List

        Source URL: faculty.nps.edu

        Language: English - Date: 2008-05-06 17:12:31
          7

          REGISTRATION DOCUMENT SUPPLY AND DELIVERY OF COMPUTERS, COMPUTER HARDWARE EQUIPMENT SYSTEM SECURITY SOFTWARE AND COMPUTER ACCESSORIES

          Add to Reading List

          Source URL: www.youthfund.go.ke

          Language: English - Date: 2017-05-24 13:41:29
            8

            Creating and Managing Computer Security Incident Handling Teams (CSIRTs) CERT Training and Education Networked Systems Survivability Software Engineering Institute

            Add to Reading List

            Source URL: www.first.org

            - Date: 2017-08-08 15:42:43
              9

              ITL BULLETIN FOR JULY 2016 IMPROVING SECURITY AND SOFTWARE MANAGEMENT THROUGH THE USE OF SWID TAGS David Waltermire, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory

              Add to Reading List

              Source URL: csrc.nist.gov

              - Date: 2016-08-23 14:55:14
                10Software / Computer security / System software / Antivirus software / Malwarebytes / Malware / Avira / Computer virus / Zero-day / Marcin Kleczynski

                C A S E S T U DY Food for the Hungry stops malware in its tracks This nonprofit uses Malwarebytes Anti-Malware for Business to detect and stop malware from gobbling valuable time from its mission

                Add to Reading List

                Source URL: pt.malwarebytes.com

                Language: English - Date: 2016-07-07 18:41:23
                UPDATE