Cyber

Results: 13321



#Item
971

Institute for Cyber Security Security and Trust Convergence: Attributes, Relations and Provenance Prof. Ravi Sandhu Executive Director, Institute for Cyber Security

Add to Reading List

Source URL: profsandhu.com

Language: English - Date: 2014-09-13 21:33:30
    972Computing / Computer network security / Multi-agent systems / Spamming / Concurrent computing / Cyberwarfare / Botnet / Distributed computing / Computer virus / Malware / Algorithmic trading / Antivirus software

    BOT-TREK CYBER INTELLIGENCE ci.group-ib.com GROUP-IB REPORT: ANALYSIS OF ATTACKS AGAINST TRADING AND BANK CARD

    Add to Reading List

    Source URL: www.group-ib.ru

    Language: English - Date: 2016-02-08 03:52:06
    973

    IBM Security Systems – Cyber Center of Excellence Protecting the Cloud from Inside • Intra-cloud security intelligence • Protection of Linux containers • Mitigation of NoSQL injections

    Add to Reading List

    Source URL: tce.webee.eedev.technion.ac.il

    Language: English - Date: 2015-09-16 03:22:51
      974

      Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents Yang Liu1 , Armin Sarabi1 , Jing Zhang1 , Parinaz Naghizadeh1 Manish Karir2 , Michael Bailey3 , Mingyan Liu1,2 1 EECS Department, University of Michiga

      Add to Reading List

      Source URL: web.engr.illinois.edu

      Language: English - Date: 2015-08-05 18:31:26
        975

        PRESS RELEASE TRESYS XD AIR MITIGATES THREATS FROM BADUSB Columbia, MD - August 13, Tresys Technology, a global leader in cyber defense, announced today that the BadUSB family of attacks can be mitigated by implem

        Add to Reading List

        Source URL: www.tresys.com

        Language: English - Date: 2015-03-18 16:38:40
          976

          Professor Ravi Sandhu University of Texas at San Antonio Executive Director and Founder, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security

          Add to Reading List

          Source URL: profsandhu.com

          Language: English - Date: 2016-01-19 19:27:47
            977

            Institute for Cyber Security Future of Access Control: Attributes, Automation, Adaptation Prof. Ravi Sandhu Executive Director, Institute for Cyber Security

            Add to Reading List

            Source URL: profsandhu.com

            Language: English - Date: 2013-12-19 00:37:49
              978

              PDF Document

              Add to Reading List

              Source URL: cyber.law.harvard.edu

              - Date: 2016-02-11 21:37:04
                979

                Deep-Secure Guard and Assuria Log Manager The Deep-Secure XML Guard enforces the constraints necessary to protect XML applications, combats XML-borne targeted cyber-attacks and guards against data leakage and exfiltratio

                Add to Reading List

                Source URL: www.deep-secure.com

                Language: English - Date: 2015-06-01 11:43:25
                  980

                  Occupant-Centric Federated Cyber-Physical System for Building Management Pandarasamy Arjunan Indraprastha Institute of Information Technology, Delhi, India

                  Add to Reading List

                  Source URL: nslab.ee.ntu.edu.tw

                  Language: English - Date: 2012-11-23 08:15:55
                    UPDATE