Cyber

Results: 13321



#Item
521Security / Prevention / Safety / Computer security / Government of the United Kingdom / Information sensitivity / Data security / Cyberwarfare / Security Policy Framework / Regulatory compliance / IT risk / National Cyber Security Policy

VICTORIAN PROTECTIVE DATA SECURITY FRAMEWORK JUNE 2016

Add to Reading List

Source URL: www.cpdp.vic.gov.au

Language: English - Date: 2016-06-28 01:36:03
522

. Jahresbericht 2015 Umsetzung der Nationalen Strategie zum Schutz der Schweiz vor Cyber-Risiken (NCS) Steuerungsausschuss NCS

Add to Reading List

Source URL: www.isb.admin.ch

Language: German
    523Unix / Computing / Software / System software / Digital media / Research / System administration / USENIX / Cyber-physical system / Electronic submission / Computer security

    Announcement and Call for Papers 4th Workshop on Cyber Security Experimentation and Test (CSET ’11) Sponsored by USENIX, the Advanced Computing Systems Association http://www.usenix.org/cset11

    Add to Reading List

    Source URL: static.usenix.org

    Language: English - Date: 2011-04-25 15:59:03
    524Cyberwarfare / Computing / Security / Hacking / Computer network security / Malware / Server / Computer security / CSC Version 6.0 / Cyber-collection

    THE PROJECTSAURON APT Global Research and Analysis Team VersionAugust 9, 2016) The ProjectSauron APT

    Add to Reading List

    Source URL: cdn.securelist.com

    Language: English - Date: 2016-08-09 10:39:42
    525

    PM_172_12_Cyber_Round_Table_Mai_2012.pdf

    Add to Reading List

    Source URL: www.stmi.bayern.de

    Language: German - Date: 2015-04-28 02:52:44
      526Actuarial science / Risk / Probability / Academia / Prevention / Financial risk / Threat / Psychology

      Preliminary Investigation on Psychological Traits of Users Prone to be damaged by Cyber-attack Takeaki Terada Yoshinori Katayama

      Add to Reading List

      Source URL: cups.cs.cmu.edu

      Language: English - Date: 2015-07-03 02:38:47
      527Security / Prevention / Cyberwarfare / National security / United States Department of Homeland Security / Cybercrime / Hacking / Computer security / Cyberwarfare in the United States / Cyberspace / Cyber-attack / National Cyber Security Policy

      The Collaboration Imperative for Cyberspace Stakeholders Author: Mr. Riley Repko, HQE to the Air Force Deputy Chief of Staff for Operations, Plans & Requirements Executive Summary I. Challenge Cyberspace is a core enable

      Add to Reading List

      Source URL: www.it-aac.org

      Language: English - Date: 2015-06-22 12:07:28
      528Obfuscation / Index of standards articles / Standards / Index of Abkhazia-related articles

      Cyber Generation Tech Stars Scholarship Program T ech Stars Scholarship awards are for

      Add to Reading List

      Source URL: www.scate.org

      Language: English - Date: 2016-04-06 12:20:33
      529Minnesota / United States

      FY17 Supplemental Request Cyber Security $19 million one-time Upgrade the University’s network to improve data protection systemwide for

      Add to Reading List

      Source URL: govrelations.umn.edu

      Language: English - Date: 2016-01-11 12:16:57
      530Computing / Computer network security / Cyberwarfare / Computer security / Multi-agent systems / Spamming / Intrusion detection system / Malware / Computer virus / Botnet / Alert correlation / Infection

      BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology

      Add to Reading List

      Source URL: www.cyber-ta.org

      Language: English - Date: 2007-06-29 16:14:13
      UPDATE