Cyber University

Results: 576



#Item
71

Zero-Knowledge Password Policy Checks and Verifier-Based PAKE Franziskus Kiefer and Mark Manulis Surrey Centre for Cyber Security Department of Computing, University of Surrey, UK , mark@manulis.e

Add to Reading List

Source URL: manulis.eu

Language: English - Date: 2014-10-18 08:11:14
    72

    Data Security – Challenges and Research Opportunities Elisa Bertino(&) Cyber Center, CS Department, and CERIAS, Purdue University, West Lafayette, IN, USA

    Add to Reading List

    Source URL: www.cs.purdue.edu

    Language: English - Date: 2014-07-28 12:37:35
      73

      CYBER-INSURANCE REVISITED Cyber-Insurance Revisited Workshop on the Economics of Information Security Kennedy School of Government · Harvard University

      Add to Reading List

      Source URL: infosecon.net

      Language: English - Date: 2006-03-16 20:15:29
        74

        Percolation in a Hierarchical Lattice Yilun Shang Institute for Cyber Security, University of Texas at San Antonio, Texas 78249, USA Reprint requests to Y. S.; E-mail: Z. Naturforsch. 67a, 225 – 22

        Add to Reading List

        Source URL: www.znaturforsch.com

        Language: English - Date: 2012-05-08 09:40:34
          75Spamming / Social engineering / Email / Cybercrime / Identity theft / Phishing / Web beacon / Microsoft SmartScreen / Spoofed URL

          Measuring the Human Factor of Cyber Security Brian M. Bowen, Ramaswamy Devarajan, Salvatore Stolfo Department of Computer Science Columbia University {bb2281, rd2446, sjs11}cs.columbia.edu

          Add to Reading List

          Source URL: ids.cs.columbia.edu

          Language: English - Date: 2012-09-17 11:40:55
          76

          Cost Functions for Scheduling Tasks in Cyber-physical Systems Abhinna Jain, C. M. Krishna, Israel Koren and Zahava Koren Electrical and Computer Engineering, University of Massachusetts, Amherst, MA 01003, U.S.A. {jain,

          Add to Reading List

          Source URL: euler.ecs.umass.edu

          Language: English - Date: 2012-10-12 17:24:58
            77

            Designing STAR: A Cyber Dashboard Prototype Sean McKenna University of Utah & MIT Lincoln Laboratory Salt Lake City, UT | Keywords

            Add to Reading List

            Source URL: mckennapsean.com

            Language: English - Date: 2016-01-09 01:41:26
              78

              PSERC Future Grid Initiatives Webinar Series Cyber Physical Security for Smart Grid Broad Analysis: Information Hierarchy for the Future Grid Manimaran Govindarasu & Adam Hahn Iowa State University

              Add to Reading List

              Source URL: pserc.wisc.edu

              Language: English
                79Software / Computing / Application software / Scientific method / Salvatore J. Stolfo / User / Milgram experiment / Statistics / ROOT / Internet privacy / Data analysis / Windows Vista

                On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned Malek Ben Salem and Salvatore J. Stolfo Computer Science Department Columbia University

                Add to Reading List

                Source URL: ids.cs.columbia.edu

                Language: English - Date: 2011-09-04 10:44:35
                80

                Resilient Wireless Sensor Networks for Cyber-Physical Systems Waseem Abbas∗, Aron Laszka†, and Xenofon Koutsoukos‡ Vanderbilt University, Nashville, TNAbstract Due to their low deployment costs, wireless sen

                Add to Reading List

                Source URL: aronlaszka.com

                Language: English - Date: 2015-07-28 23:43:34
                  UPDATE