Cyber University

Results: 576



#Item
121American Association of State Colleges and Universities / James Madison University / Commonwealth of Independent States

Cyber  Security  Lab  Access  Form     Directions:       Complete  this  application  by  providing  the  information  requested  in  the  fields  below.  

Add to Reading List

Source URL: www.jmu.edu

Language: English - Date: 2015-05-27 11:37:33
122Computing / Intrusion detection system / Alert correlation / Thresh / Bayesian network / Snort / Intrusion detection system evasion techniques / Computer network security / Software / System software

Reasoning about Complementary Intrusion Evidence∗ Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:57
123Theoretical computer science / Rough set / Attribute grammar / Alert messaging / Internet privacy / Privacy / Attribute / Lookup table / Computing / Computer programming / Ethics

A Flexible Approach to Intrusion Alert Anonymization and Correlation Dingbang Xu and Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-02 15:23:09
124Ambient intelligence / Cyberwarfare / Computer crimes / Control Data Corporation / War / Military / Crime / Internet-related prefixes / Prefixes / Cyber

Brain Informatics Cyber-Individual Meets Brain Informatics Jianhua Ma, Hosei University, Japan Jie Wen, Huazhong University of Science and Technology, China

Add to Reading List

Source URL: cis.k.hosei.ac.jp

Language: English - Date: 2015-04-06 04:59:30
125CERT Coordination Center / Computing / Organisation of Islamic Cooperation / Request Tracker / Computer crimes / Internet / Cyber security and countermeasure / United States Computer Emergency Readiness Team / Carnegie Mellon University / Computer emergency response team / Internet governance

Microsoft WordFeb-25 Media Release APCERT Drill - Final version)

Add to Reading List

Source URL: www.oic-cert.org

Language: English - Date: 2014-03-05 03:12:03
126Science / Chemistry / Peter Kollman / Drug design / Research

Kenneth M. Merz Jr. Ph.D. Kenneth M. Merz, Jr. is currently the Director of the Institute for Cyber Enabled Research (iCER) and the Joseph Zichis Chair in Chemistry at Michigan State University. His research interest lie

Add to Reading List

Source URL: www.merzgroup.org

Language: English - Date: 2013-08-11 11:21:19
127University of Maryland /  Baltimore County / Security / International Multilateral Partnership Against Cyber Threats / Computer security / Crime / Public safety / American Association of State Colleges and Universities / Association of Public and Land-Grant Universities / Middle States Association of Colleges and Schools

  CSEE  News SPRING  2013 ISSUE  04

Add to Reading List

Source URL: www.csee.umbc.edu

Language: English - Date: 2013-02-10 12:53:44
128Behavioral addiction / Problem gambling / Online gambling / Gambling / Cyber-bullying / Responsible Gaming / Intervention / Bullying / Internet addiction disorder / Ethics / Behavior / Abuse

Spring 2011 Volume 11, Issue 1 Internet Interventions for the Treatment of Problem Gambling By Sally Gainsbury, Ph.D., Centre for Gambling Education & Research, Southern Cross University The past twenty years has seen

Add to Reading List

Source URL: youthgambling.mcgill.ca

Language: English - Date: 2011-04-21 13:04:08
129Politics / Information society / Internet activism / Electronic civil disobedience / Hacktivism / National University of Singapore / Cyberspace / Social movement / Technology / Activism / Hacking

INTER-ASIA ROUNDTABLE 2012 METHODOLOGICAL AND CONCEPTUAL ISSUES IN CYBER ACTIVISM RESEARCHAUGUST 2012 ORGANISED BY

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2012-08-30 15:02:42
130Computing / Routing / Dynamic Source Routing / B.A.T.M.A.N. / Wireless networking / Network architecture / Ad hoc On-Demand Distance Vector Routing

How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-Hoc Routing Protocols 1,2 Peng Ning and Kun Sun Cyber Defense Laboratory, Computer Science Department, North Carolina State University, Raleigh, NC 27

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:59
UPDATE