Countermeasure

Results: 441



#Item
21Gaps between industrial and academic solutions to implementation loopholes in QKD: testing random-detector-efficiency countermeasure in a commercial system Anqi Huang,1, 2, ∗ Shihan Sajeed,1, 2 Poompong Chaiwongkhot,1,

Gaps between industrial and academic solutions to implementation loopholes in QKD: testing random-detector-efficiency countermeasure in a commercial system Anqi Huang,1, 2, ∗ Shihan Sajeed,1, 2 Poompong Chaiwongkhot,1,

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2016-03-21 20:28:57
22NAWCWPNS TPApril 1997 w / Rev 2 of 1 April 1999 and later changes

NAWCWPNS TPApril 1997 w / Rev 2 of 1 April 1999 and later changes

Add to Reading List

Source URL: avia-kurs.narod.ru

Language: English - Date: 2013-04-05 08:14:48
23COUNTERMEASURE DEPLOYMENT  Fighter pilots don’t like to leave home without our missile-countering towed decoys. That’s because Meggitt’s airborne decoy deployment systems are integral to the countermeasures that de

COUNTERMEASURE DEPLOYMENT Fighter pilots don’t like to leave home without our missile-countering towed decoys. That’s because Meggitt’s airborne decoy deployment systems are integral to the countermeasures that de

Add to Reading List

Source URL: www.meggitt.com

Language: English - Date: 2016-07-22 06:47:32
24Pole weapons / Pike / Melee / Weapon

Pikeman- Among the most ancient of weapons, polearms were used to devastating effect in the Macedonian phalanx as well as a countermeasure against medieval cavalry. Their primary appeal comes from their reach, allowing e

Add to Reading List

Source URL: www.atagar.com

Language: English - Date: 2009-01-12 23:36:04
25Building Threat Intelligence Nart Villeneuve Senior Threat Researcher, Trend Micro Countermeasure 2012

Building Threat Intelligence Nart Villeneuve Senior Threat Researcher, Trend Micro Countermeasure 2012

Add to Reading List

Source URL: countermeasure2012.com

Language: English - Date: 2012-11-01 08:17:18
26Mapping & Evolution of Android Permissions Zach Lanier & Andrew Reiter COUNTERMEASURE

Mapping & Evolution of Android Permissions Zach Lanier & Andrew Reiter COUNTERMEASURE

Add to Reading List

Source URL: countermeasure2012.com

Language: English - Date: 2012-11-01 08:16:13
27NRL BAA Announcement #OFFBOARD COUNTERMEASURE TECHNIQUES AND TECHNOLOGY RESEARCH AND DEVELOPMENT The U.S. Navy is interested in exploring the use of Offboard Countermeasure

NRL BAA Announcement #OFFBOARD COUNTERMEASURE TECHNIQUES AND TECHNOLOGY RESEARCH AND DEVELOPMENT The U.S. Navy is interested in exploring the use of Offboard Countermeasure

Add to Reading List

Source URL: heron.nrl.navy.mil

Language: English - Date: 2016-06-10 13:30:04
    28IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 20, NO. 3, JUNEAdaptive Selective Verification: An Efficient Adaptive Countermeasure to Thwart DoS Attacks

    IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 20, NO. 3, JUNEAdaptive Selective Verification: An Efficient Adaptive Countermeasure to Thwart DoS Attacks

    Add to Reading List

    Source URL: seclab.illinois.edu

    Language: English - Date: 2012-07-19 11:09:03
      29Turn-key Vulnerability Management Greenbone Security Manager The solution for IT security in your organisation

      Turn-key Vulnerability Management Greenbone Security Manager The solution for IT security in your organisation

      Add to Reading List

      Source URL: www.greenbone.net

      Language: English - Date: 2016-06-15 04:15:49
      30

      APPROVED IGNITION INTERLOCK MANUFACTURERS FOR NEW MEXICO 9/15 rev. Manufacturer Contact 1 Contact 2 New Mexico Representative Alcohol Countermeasure Systems

      Add to Reading List

      Source URL: transportation.unm.edu

      Language: English - Date: 2015-09-18 14:33:56