Cyber

Results: 13321



#Item
1

Cyber Sicherheit - Gibt es rechtliche Vorgaben und Standards?

Add to Reading List

Source URL: www.mme.ch

Language: German - Date: 2018-10-16 10:54:26
    2World Wide Web / Search engine optimization / Graph theory / Google Search / PageRank / Reputation management / Graph

    2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects T. Minárik, R. Jakschis, L. Lindström (Eds © NATO CCD COE Publications, Tallinn Permission to make digital or hard copies of thi

    Add to Reading List

    Source URL: www.lenders.ch

    Language: English - Date: 2018-06-20 05:24:32
    3Security / National security / Cyberwarfare / Prevention / Cooperative Cyber Defence Centre of Excellence / Security engineering / Cybercrime / SCADA / Proactive cyber defence / Computer security

    NATO Cooperative Cyber Defence Centre of Excellence (the Centre) is a NATO-accredited International Military Organisation dealing with education, consultation, lessons learned, research and development in the field of cy

    Add to Reading List

    Source URL: www.ccdcoe.org

    Language: English - Date: 2016-08-04 08:04:56
    4Computer security / Cybercrime / Cyberwarfare / Computer network security / Security engineering / Computing / National security / Deception technology / Cyberattack / Intrusion detection system / Botnet / Denial-of-service attack

    Poster: A Website Protection Framework Against Targeted Attacks based on Cyber Deception Jianbao Lin*, Chaoge Liu†, Xiang Cui*†‡, Zhaopeng Jia* * Beijing University of Posts and Telecommunications, Beijing, China

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-15 12:53:26
    5Systems engineering / Digital electronics / Formal methods / Systems science / Electronic engineering / Logic simulation / Simulation / Verification / SIGNAL / Scientific modelling / Software verification and validation

        ADVANCE     ADVANCED  DESIGN  AND  VERIFICATION  ENVIRONMENT  FOR  CYBER-­‐PHYSICAL  SYSTEM  

    Add to Reading List

    Source URL: www.advance-ict.eu

    Language: English - Date: 2015-10-27 08:55:01
    6Cryptography / Access control / Papermaking / Digital photography / Digital watermarking / Authentication / Money forgery / Watermark / Convolutional code / Cinavia

    2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects T. Minárik, R. Jakschis, L. Lindström (Eds © NATO CCD COE Publications, Tallinn Permission to make digital or hard copies of thi

    Add to Reading List

    Source URL: www.lenders.ch

    Language: English - Date: 2018-06-20 05:23:08
    7Cryptography / Obfuscation / Computer security / Password / Security / Cyberwarfare / Salt / Identity management / Password policy / Password fatigue

    Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-13 08:13:56
    8Security / Security breaches / Prevention / Ransomware / Cybercrime / Malware / Locky / Computer security

    Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-24 15:44:20
    9World Wide Web / Search engine optimization / Graph theory / Google Search / PageRank / Reputation management / Graph

    2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects T. Minárik, R. Jakschis, L. Lindström (Eds © NATO CCD COE Publications, Tallinn Permission to make digital or hard copies of thi

    Add to Reading List

    Source URL: nsg.ee.ethz.ch

    Language: English - Date: 2018-06-05 16:09:27
    UPDATE