Cyberwarfare

Results: 11990



#Item
601Computing / Computer networking / Cyberwarfare / Internet protocols / Data transmission / Denial-of-service attacks / Named data networking / Packet loss / IP multicast / Network packet / Communications protocol / Transport layer

Consumer / Producer Communication with Application Level Framing in Named Data Networking Ilya Moiseenko UCLA

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-10-01 13:12:00
602Computing / Internet / Cryptography / Cybercrime / Internet Standards / Internet protocols / Cyberwarfare / National security / Denial-of-service attack / Computer security / Border Gateway Protocol / DNS spoofing

Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents Yang Liu1 , Armin Sarabi1 , Jing Zhang1 , Parinaz Naghizadeh1 Manish Karir2 , Michael Bailey3 , Mingyan Liu1,2 1 EECS Department, University of Michiga

Add to Reading List

Source URL: mdbailey.ece.illinois.edu

Language: English - Date: 2015-08-05 18:31:26
603Cyberwarfare / Computing / Computer security / Software maintenance / Software release / Patch / Computer network security / Vulnerability / Common Vulnerabilities and Exposures / Transdermal patch / Computer worm / Shavlik Technologies

Timing the Application of Security Patches for Optimal Uptime Steve Beattie, Seth Arnold, Crispin Cowan, Perry Wagle, and Chris Wright † – WireX Communications, Inc. Adam Shostack – Zero Knowledge Systems, Inc. ABS

Add to Reading List

Source URL: adam.shostack.org

Language: English - Date: 2014-06-11 11:42:33
604Cyberwarfare / Computer security / Computing / Computer network security / Hacking / Software testing / Software bugs / Vulnerability / Heartbleed / Zero-day / Cross-site scripting / Security testing

Website Security Statistics Report 2015 About This Report WhiteHat Security’s Website Security Statistics

Add to Reading List

Source URL: info.whitehatsec.com

Language: English - Date: 2016-02-25 05:35:53
605Security / Cyberwarfare / Computing / Smart grid / Computer network security / Computer security / Cryptography / National security / Smart meter / Internet privacy / Privacy policy / National Institute of Standards and Technology

Microsoft Word - Integrity-Security Principles)

Add to Reading List

Source URL: www.smartgrid.gov

Language: English - Date: 2015-02-12 06:56:48
606Computing / Security / Cyberwarfare / Computer security / Computer network security / Cybercrime / National security / Knowledge representation / Situation awareness / Cyberspace / Threat / Common Information Model

SITUATIONAL AWARENESS Gaining an Edge in Cyberspace with Advanced Situational Awareness Vincent Lenders | armasuisse Axel Tanner | IBM Research

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2015-04-23 06:59:54
607Cyberwarfare / Computer security / Security / Federal Information Security Management Act / IT risk management / Risk management / FedRAMP / United States Department of Homeland Security / National Cybersecurity Center of Excellence / Cyber-security regulation

Measuring What Matters: Reducing Risk by Rethinking How We Evaluate Cybersecurity March 2013

Add to Reading List

Source URL: www.tdisecurity.com

Language: English - Date: 2014-04-02 16:48:01
608Secure communication / Security / Cyberwarfare / Computing / Electronic voting in Estonia / Electronic voting / Computer network security / Cryptographic protocols / Denial-of-service attack / Voting system / Server / Absentee ballot

Security Analysis of the Estonian Internet Voting System Drew Springall† Travis Finkenauer† Zakir Durumeric† Jason Kitcat‡ Harri Hursti Margaret MacAlpine J. Alex Halderman† † University of Michigan, Ann Arb

Add to Reading List

Source URL: aaspring.com

Language: English - Date: 2015-01-16 19:16:47
609Computer network security / Cyberwarfare / Computer security / Computing / Computer worm / Intrusion detection system / Anti-worm / Firewall / Computer network / Malware / Witty / Worm

Worms vs. Perimeters: The Case for Hard-LANs Nicholas Weaver Dan Ellis

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:10
610Computing / Computer network security / Cyberwarfare / Data security / Transmission Control Protocol / Packet injection / Sandvine / Firewall / Traffic flow / Internet protocol suite / Idle scan

Detecting Forged TCP Reset Packets Nicholas Weaver ICSI Robin Sommer

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:05
UPDATE