Cyberwarfare

Results: 11990



#Item
611Computing / Computer security / Software / Computer network security / Cyberwarfare / Data security / Port scanner / Transmission Control Protocol / Firewall / Antivirus software / Cache / Bloom filter

Very Fast Containment of Scanning Worms Nicholas Weaver ICSI Stuart Staniford Nevis Networks

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:10
612Software development / Computer security / Cyberwarfare / Software testing / Computer network security / Software Bill of Materials / Software development process / Software project management / Supply chain management / Vulnerability / Codenomicon / Patch

AppCheck Build a More Resilient World KEY APPCHECK FEATURES: • Scan Anything in Minutes

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:14
613Cyberwarfare / Computer network security / Computer security / Crime prevention / Cryptography / National security / Cyber-attack / Cyber security standards

Roadmap to Secure Control Systems in the Water Sector

Add to Reading List

Source URL: www.awwa.org

Language: English - Date: 2013-03-29 15:26:12
614Cyberwarfare / Computer security / Security / Computer network security / Software testing / Software bugs / Hacking / Vulnerability / Buffer overflow protection / Exploit / Attack

Relative Vulnerability: An Empirical Assurance Metric Crispin Cowan, PhD CTO, Immunix

Add to Reading List

Source URL: adam.shostack.org

Language: English - Date: 2014-06-11 11:49:30
615Software / Computing / Computer networking / Named data networking / Computer network security / Cyberwarfare / Network architecture / Synchronization / DOS Navigator / Internet protocol suite / Google Chrome / Computer security

Microsoft Word - icnt44-ben-abraham

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-10-01 13:10:15
616Computer network security / Computer security / Cryptography / Cyberwarfare / National security / Secure communication / Bachelor of Science in Information Technology / University of Limerick / Electrical engineering / Pulchok Campus / UP Diliman Electrical and Electronics Engineering Institute

Technical image with pc board connected to testing wires. laptop, drawings and multimeter in scene.

Add to Reading List

Source URL: www.ece.ul.ie

Language: English - Date: 2015-04-20 11:48:45
617Security / Computing / Computer security / Cyberwarfare / Computer network security / Cybercrime / National security / Threat / Information security operations center / Abuse / United States Computer Emergency Readiness Team / New Jersey Cybersecurity and Communications Integration Cell

AbuseSA Build a More Resilient World KEY ABUSESA FEATURES: • Automated Data Collection

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:12
618Computing / Computer security / Cyberwarfare / Hacking / Software testing / Vulnerability / SQL injection / Transport Layer Security / Dynamic SSL

http://www.sektioneins.de Security Problems in Web Applications except Injection Vulnerabilities Stefan Esser <> Ben Fuhrmannek <>

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2011-02-06 15:51:10
619Computer network security / Cyberwarfare / Computer security / Salvatore J. Stolfo / Cryptography / Intrusion detection system / Decoy / Network security / Rootkit / Malware / Computer virus / Antivirus software

Insider Threats Designing Host and Network Sensors to Mitigate the Insider Threat Insider attacks—that is, attacks by users with privileged

Add to Reading List

Source URL: ids.cs.columbia.edu

Language: English - Date: 2011-09-04 10:44:35
UPDATE