CyberCrime

Results: 3090



#Item
521Spam filtering / Spamming / Computing / Cyberspace / Email / Cybercrime / Email spam / Anti-spam techniques / Spam / Naive Bayes spam filtering

Data Compression Models for Prediction and Classification Gordon CORMACK1 University of Waterloo, Waterloo, Canada Abstract. The crux of data compression is to process a string of bits in order, predicting each subsequen

Add to Reading List

Source URL: plg.uwaterloo.ca

Language: English - Date: 2007-12-14 09:36:19
522

Risks of Offline Verify PIN on Contactless Cards Martin Emms, Budi Arief, Nick Little, Aad van Moorsel Newcastle University Centre for Cybercrime & Computer Security 1

Add to Reading List

Source URL: fc13.ifca.ai

Language: English - Date: 2013-04-08 20:26:00
    523Computer access control / E-commerce / Online banking / Cybercrime / Security token / Bank / Transaction authentication number / User / Password / Computer security / Multi-factor authentication / Guardian Analytics

    Online Banking User Guide Business Online Security The security of your information is one of our most important responsibilities. You can be confident, knowing that Alpine Bank is dedicated to ensuring the highest level

    Add to Reading List

    Source URL: www.alpinebank.com

    Language: English - Date: 2013-12-17 13:20:47
    524Computing / Software / Technology / Cyberwarfare / Social media / Cybercrime / Twitter / Computer network security / Cozy Bear / Hashtag / Computer security / Botnet

    v1-04 [преобразованный]

    Add to Reading List

    Source URL: www2.fireeye.com

    Language: English - Date: 2016-03-02 08:11:14
    525Cyberwarfare / Computer security / Computer network security / Cybercrime / National security / Cyber-attack / Denial-of-service attack / Malware / Stuxnet / Botnet / Attack / Spyware

    Global Mapping of Cyber Attacks Ghita Mezzour, L. Richard Carley, Kathleen M. Carley 2014 CMU-ISR

    Add to Reading List

    Source URL: www.casos.cs.cmu.edu

    Language: English
    526

    www.pwc.ch/crimesurvey Cybercrime in the spotlight Swiss Economic Crime Survey 2011

    Add to Reading List

    Source URL: www.security-finder.ch

    Language: English - Date: 2011-12-02 03:26:58
      527Computer security / Security / Computer access control / Cybercrime / Identity management / Computer network security / Password / Multi-factor authentication / Phishing / Authentication / Transaction authentication number / LastPass

      Security for an age of zero trust A Two-factor authentication:

      Add to Reading List

      Source URL: www.ciosummits.com

      Language: English - Date: 2016-01-25 16:20:59
      528Computer network security / Spamming / Cyberwarfare / Cybercrime / Spyware / Salvatore J. Stolfo / Simulation / VM / Computer virus / Hypervisor / Malware / Keystroke logging

      BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection! Brian M. Bowen 1 , Pratap Prabhu 1 , Vasileios P. Kemerlis 1 , Stelios Sidiroglou 2 , Angelos D. Keromytis 1 , and S

      Add to Reading List

      Source URL: ids.cs.columbia.edu

      Language: English - Date: 2011-09-04 10:44:35
      529

      Fearless tech entrepreneurs experiment their way to the top Tech firms are thriving — but face a big headache fighting cybercrime, says Hiscox’s Steve Langan

      Add to Reading List

      Source URL: www.fasttrack.co.uk

      Language: English - Date: 2015-09-05 17:48:21
        530

        Fighting Cybercrime Digitale Kriminalistik Öffentliche Vorlesung am 26. Juni 2009 Stefan Becker Kriminalhauptkommissar

        Add to Reading List

        Source URL: net.cs.uni-bonn.de

        Language: German - Date: 2009-06-30 07:10:20
          UPDATE