Cyberwarfare

Results: 11990



#Item
591Cyberwarfare / Computer security / Computer network security / Cybercrime / National security / Cyber-attack / Denial-of-service attack / Malware / Stuxnet / Botnet / Attack / Spyware

Global Mapping of Cyber Attacks Ghita Mezzour, L. Richard Carley, Kathleen M. Carley 2014 CMU-ISR

Add to Reading List

Source URL: www.casos.cs.cmu.edu

Language: English
592Computing / Computer security / Computer network security / Security engineering / Cyberwarfare / Intrusion detection system / System administration / Botnet / Computer virus / Malware / Alert correlation / Bro

BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology

Add to Reading List

Source URL: faculty.cs.tamu.edu

Language: English - Date: 2007-05-15 01:33:26
593Computer network security / Spamming / Cyberwarfare / Cybercrime / Spyware / Salvatore J. Stolfo / Simulation / VM / Computer virus / Hypervisor / Malware / Keystroke logging

BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection! Brian M. Bowen 1 , Pratap Prabhu 1 , Vasileios P. Kemerlis 1 , Stelios Sidiroglou 2 , Angelos D. Keromytis 1 , and S

Add to Reading List

Source URL: ids.cs.columbia.edu

Language: English - Date: 2011-09-04 10:44:35
594Prevention / Computing / Safety / Computer network security / Computer security / Cryptography / Cyberwarfare / National security / Secure communication / Cyber-physical system / Dependability

DECSoS 2015: EWICS/ERCIM/ARTEMIS Dependable Cyber-Physical Systems and Systems-of-Systems Workshop Programme September 22, 2015 Delft, The Netherlands Tuesday, 22nd September 2015

Add to Reading List

Source URL: safecomp2015.tudelft.nl

Language: English - Date: 2015-09-14 10:24:23
595Fingerprinting algorithms / Cyberwarfare / Denial-of-service attack / Denial-of-service attacks / Internet Relay Chat / Fingerprint / Internet privacy / Security / Surveillance / Access control

Website Fingerprinting Attacking Popular Privacy Enhancing Technologies with the Multinomial Naïve-Bayes Classifier Dominik Herrmann, Hannes Federrath University of Regensburg, Germany

Add to Reading List

Source URL: digitalpiglet.org

Language: English - Date: 2009-11-27 08:33:02
596Cyberwarfare / Computer security / Security / Computer network security / Denial-of-service attacks / SQL Slammer / Code Red / Computer worm / Witty

Preliminary Results Using Scale-Down to Explore Worm Dynamics Nicholas Weaver∗ Ihab Hamadeh†

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:10
597Computer memory / Computing / Software bugs / Software engineering / Cyberwarfare / Buffer overflow / Program analysis / Control flow graph / Data buffer / Data-flow analysis / Vulnerability

Transformation-aware Exploit Generation using a HICFG Dan Caselden Alex Bazhanyuk Mathias Payer Laszlo Szekeres

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2013-05-16 23:27:09
598Cyberwarfare / Computer network security / Denial-of-service attacks / Computer networking / Named data networking / Interest Flooding Attack / Denial-of-service attack / Forwarding plane / Computer network / Computer security

Revisiting Countermeasures Against NDN Interest Flooding Samir Al-Sheikh Matthias Wählisch

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-10-01 13:27:13
599Computer security / Cyberwarfare / Security / Computer network security / Cybercrime / Hacking / FireEye / Advanced persistent threat / Vulnerability / Phishing / Zero-day

FIREEYE AS A SERVICE IN ACTION: A Global, Coordinated Effort

Add to Reading List

Source URL: www.fireeye.de

Language: English - Date: 2016-02-10 18:53:46
600

Office Documents: New Weapons of Cyberwarfare Jonathan Dechaux, Eric Filiol, Jean-Paul Fizaine ESIEA Laval, Laboratoire de cryptologie et de virologie op´erationnelles, 38 rue des Dr Calmette et Gu´erin, 53000 Laval, F

Add to Reading List

Source URL: archive.hack.lu

Language: English - Date: 2010-10-29 15:08:55
    UPDATE