Cyberwarfare

Results: 11990



#Item
621Computing / Cyberwarfare / Software engineering / Hacking / Software testing / SQL / Computer security / Data management / SQL injection / Vulnerability / Data-flow analysis / Denial-of-service attack

Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android Applications Daniele Gallingani Rigel Gjomemo, V.N. Venkatakrishnan

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-20 23:58:55
622Computer security / Software / Cyberwarfare / Antivirus software / Malware / Rootkits / Computer network security / Kaspersky Lab / Duqu / Kaspersky Anti-Virus / Duke

THE DUKES 7 years of Russian cyberespionage TLP: WHITE This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the Dukes, a well-resourced, highly

Add to Reading List

Source URL: www.f-secure.com

Language: English - Date: 2015-09-17 01:34:34
623Security / Cryptography / Cyberwarfare / Computer network security / Computer security / Crime prevention / National security

POSTER: Security By Mobility in Location and Track Verification Matthias Schäfer† † Daniel S. Berger†

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2015-08-08 10:29:40
624Denial-of-service attacks / Cyberwarfare / Computing / Domain name system / Denial-of-service attack / Internet Relay Chat / Computer security / Internet activism / Transmission Control Protocol / Computer network security / TCP reset attack / Domain Name System Security Extensions

JPCERT/CC Internet Threat Monitoring Report[January 1, March 31, 2015]

Add to Reading List

Source URL: www.jpcert.or.jp

Language: English - Date: 2015-06-29 20:52:09
625Government / Security / Computer network security / Computer security / Crime prevention / Cryptography / Cyberwarfare / National security / Forensic science / Prosecutor / Hotspot / Telecommunications (Interception and Access) Amendment (Data Retention) Act

State of the States Cyber Crime Consortium 2014 Meeting Recap

Add to Reading List

Source URL: www.search.org

Language: English
626Computing / Cyberwarfare / Security / Computer network security / Humancomputer interaction / Crime prevention / National security / Salvatore J. Stolfo / Usability / Masquerade / Rootkit / Computer security

Modeling User Search Behavior for Masquerade Detection Malek Ben Salem and Salvatore J. Stolfo Computer Science Department Columbia University New York, USA

Add to Reading List

Source URL: ids.cs.columbia.edu

Language: English - Date: 2011-09-04 10:44:35
627Security / Cyberwarfare / Computer network security / Computer security / Crime prevention / Cryptography / National security

WWW.SMARTSIMPLE.COMThe Marine Institute of Ireland About The Marine Institute of Ireland

Add to Reading List

Source URL: www.smartsimple.com

Language: English - Date: 2015-10-14 09:52:58
628Cryptography / Computer network security / Computer security / Cyberwarfare / Kerberos / Key distribution center / Authentication protocol / Authentication / Ticket

Stealing credentials for impersonation Emmanuel Bouillon October 29, 2010 Introduction

Add to Reading List

Source URL: archive.hack.lu

Language: English - Date: 2010-10-29 15:08:35
629Network performance / Computing / Network management / Internet security / System software / Denial-of-service attacks / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Packet loss / Throughput / Transmission Control Protocol

Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks Ryan Rasti∗† , Mukul Murthy∗ , Nicholas Weaver∗† , Vern Paxson∗† ∗ UC Berkeley, † ICSI,  VMware Abstract—We introduce tempor

Add to Reading List

Source URL: icir.org

Language: English - Date: 2015-04-22 12:30:04
630Cyberwarfare / Internet censorship in China / Computing / Denial-of-service attacks / Internet activism / Human rights in China / Internet in China / Cyberspace / GreatFire / Baidu / Denial-of-service attack / GFW

An Analysis of China’s “Great Cannon” Bill Marczak Nicholas Weaver Jakub Dalek Roya Ensafi UC Berkeley, Citizen Lab

Add to Reading List

Source URL: www.usenix.org

Language: English
UPDATE