Cyberwarfare

Results: 11990



#Item
51Computing / Network performance / Network architecture / Internet / Teletraffic / Cyberwarfare / Internet protocols / Transmission Control Protocol / Quality of service / Denial-of-service attack / Voice over IP / Traffic shaping

Towards User-Centric Metrics for Denial-Of-Service Measurement Jelena Mirkovic Alefiya Hussain University of Delaware SPARTA, Inc. Peter Reiher

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2015-06-05 18:13:26
52Security / Cyberwarfare / Computer security / University of South Florida / International Multilateral Partnership Against Cyber Threats / Lawrence A. Gordon

Open Rank Faculty Position in MIS/Cybersecurity (Job IDThe Information Systems and Decision Sciences (ISDS) department and the Florida Center for Cybersecurity (FC2) at the University Of South Florida (USF) are se

Add to Reading List

Source URL: www.usf.edu

Language: English - Date: 2016-08-10 14:52:40
53Cyberwarfare / Security / Computer security / Computer network security / Ambient intelligence / Internet of things / Intel Security / Malware / Wind River Systems / Eurotech

Press Release Embedded Software Security Solutions to Ride Rising Tide of Internet of Things, According to VDC Research Ubiquitous connectivity will drive 26% annual revenue growth for vendors to help thwart malware and

Add to Reading List

Source URL: www.vdcresearch.com

Language: English - Date: 2016-02-01 13:56:30
54Software / Computer security / Cyberwarfare / Antivirus software / Malwarebytes / Malware / Ransomware / Computer virus / Zero-day / Marcin Kleczynski / IObit

C A S E S T U DY At PAPSTAR GmbH, malware no longer crashes the party Leading European distributor of party and catering products uses Malwarebytes to avoid downtime and revenue loss

Add to Reading List

Source URL: br.malwarebytes.com

Language: English - Date: 2016-07-06 12:29:13
55Security / Prevention / Safety / National security / Computer security / Crime prevention / Cryptography / Information governance / International Multilateral Partnership Against Cyber Threats / DigiNotar / Information security / Cyberwarfare

Cyber security guide for boardroom members 2 | Cyber security guide for boardroom members

Add to Reading List

Source URL: www.cybersecurityraad.nl

Language: English - Date: 2016-08-20 14:48:32
56Security / Computing / Cyberwarfare / Computer security / Computer network security / Cryptography / National security / Denial-of-service attack / Threat / Critical infrastructure protection / Internet / Vulnerability

An ideal Internet Early Warning System Dominique Petersen and Norbert Pohlmann Institute for Internet Security University of Applied Sciences Gelsenkirchen {petersen, pohlmann}@internet-sicherheit.de Abstract

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 12:57:45
57Malware / Ransomware / Cyberwarfare / Computer security / Bitcoin / TorrentLocker / CryptoLocker / Computer virus / Antivirus software / Scareware / Locky / CryptMix

Evaluating the Customer Journey of CryptoRansomware AND THE PARADOX BEHIND IT Malware goes through trends. For a while one type of

Add to Reading List

Source URL: fsecureconsumer.files.wordpress.com

Language: English - Date: 2016-07-14 18:03:25
58Cyberwarfare / Rootkit / Computer security / Transmission Control Protocol / Computing

Hardening Your System . . . . . . . . . . . . . . . . . . . . . 32 ▼ 5 Physical Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Attacking the Office . . . .

Add to Reading List

Source URL: www.hackinglinuxexposed.com

Language: English - Date: 2008-12-09 14:55:29
59Computing / Routing algorithms / Cyberwarfare / Concurrent computing / Denial-of-service attack / Denial-of-service attacks / Internet Relay Chat / Computer network / Multipath routing / Botnet / Routing / Crowds

On the Interplay of Link-Flooding Attacks and Traffic Engineering Dimitrios Gkounis1 , Vasileios Kotronis2 , Christos Liaskos3 , Xenofontas Dimitropoulos3∗ 1 NEC 2 ETH Zurich, Switzerland

Add to Reading List

Source URL: inspire.edu.gr

Language: English - Date: 2016-04-22 11:14:02
60Security / Education / Computer network security / Computer security / Cryptography / Cyberwarfare / National security / Secure communication / University of Birmingham / Gisbert Kapp / Lecture

University of Birmingham Computer Science MSc Cyber Security Semester Two

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2016-01-12 06:53:34
UPDATE