Cyber University

Results: 576



#Item
131Behavior / Social psychology / Business ethics / Persecution / Sexual harassment / Harassment in the United Kingdom / Harassment / Cyber-bullying / Workplace bullying / Ethics / Abuse / Bullying

Current and agreed  Dealing with Harassment and Bullying Policy Contact Officers Registrar and Secretary and Director of Personnel Purpose This policy forms part of the University’s commitment to creat

Add to Reading List

Source URL: www.worc.ac.uk

Language: English - Date: 2015-05-01 07:37:00
132Military technology / Cyberwarfare / Military science / War / Internet-related prefixes / Cyberspace / Crime / Legal aspects of computing / Cyberwarfare in the United States / Computer crimes / Electronic warfare / Hacking

A Call to Cyber Norms Discussions at the Harvard-MIT–University of Toronto Cyber Norms Workshops, 2O11 and 2O12 Belfer Center for Science and International Affairs Kennedy School of Government

Add to Reading List

Source URL: www.americanbar.org

Language: English - Date: 2015-04-15 13:36:38
133Alert correlation / Graph isomorphism / Graph / Degree / Subgraph isomorphism problem / Graph theory / Mathematics / Theoretical computer science

Learning Attack Strategies from Intrusion Alerts∗ Peng Ning and Dingbang Xu Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:01
134Thermodynamic entropy / Statistics / Statistical theory / Applied mathematics / Rough set / Entropy / Correlation and dependence / Alert messaging / Measurement / Theoretical computer science / Philosophy of thermal and statistical physics / Information theory

Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach ∗ Dingbang Xu and Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State University {dxu,pning}@ncsu.edu

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:57
135Cardiotocography / Reproduction / Analysis / Childbirth / Evaluation / Medicine / Obstetrics / Medical tests

Complex approach to fetal heart rate analysis: A hierarchical classification model Czech Technical University in Prague Faculty of Electrical Engineering Department of Cybernetics

Add to Reading List

Source URL: cyber.felk.cvut.cz

Language: English - Date: 2014-01-03 03:45:54
136Military technology / War / Military science / UC Institute on Global Conflict and Cooperation / International security / Cyber-security regulation / International relations / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Electronic warfare / Hacking

Jon R. Lindsay University of California Institute on Global Conflict and Cooperation 9500 Gilman Drive, Mail Code 0518, La Jolla, CA — ( — www.jonrlindsay.edu

Add to Reading List

Source URL: irps.ucsd.edu

Language: English - Date: 2015-05-27 20:35:29
137Wireless sensor network / Computer programming / Technology / Merkle signature scheme / Kademlia / Distributed data storage / Computing / Binary tree

Defending against Sybil Attacks in Sensor Networks∗ Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning Cyber Defense Laboratory, Computer Science Department North Carolina State University, Raleigh, NC {q

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:15
138Software bugs / Computer errors / Assembly languages / Buffer overflow / Stack buffer overflow / Denial-of-service attack / Stack / Call stack / Address space layout randomization / Computing / Software engineering / Computer programming

Automatic Diagnosis and Response to Memory Corruption Vulnerabilities Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris Bookholt Cyber Defense Laboratory Department of Computer Science North Carolina State University

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:02
139Communications protocol / ANT / Key distribution / Man-in-the-middle attack / Cryptography / Public-key cryptography / Message authentication code

Practical Broadcast Authentication in Sensor Networks ∗ Donggang Liu Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State University {dliu,pning}@ncsu.edu

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:12
140Spamming / Botnet / Internet Relay Chat / Internet / IRC / Computing / Multi-agent systems / Computer network security

“Hacker-Web - Securing Cyber Space” Faculty- Salim Hariri, Youssif Al-Nashif Collab. Faculty - Hsinchun Chen, Ronald Breige, Tom Holt - Michigan State University Graduate Student – Karan Chadha Project URL - http:/

Add to Reading List

Source URL: acl.ece.arizona.edu

Language: English - Date: 2014-01-18 16:54:11
UPDATE