Cyberwarfare

Results: 11990



#Item
641Computing / Message-oriented middleware / Software / System software / IBM WebSphere MQ / Managed file transfer / Inter-process communication / Cyberwarfare / Firewall / ZeroMQ / IP address / MQ

Secure Universal Messaging: Five MQ 7.1 Security Use Cases A.J. Aronoff, Connectivity Practice Director, Prolifics T.Rob Wyatt, WebSphere C&I Product Manager, Security, IBM Session Number #1869

Add to Reading List

Source URL: t-rob.net

Language: English - Date: 2012-05-01 02:38:04
642Avionics / Computer network security / Computing / Security / Cyberwarfare / Air traffic control / Automatic dependent surveillance  broadcast / Intrusion detection system / Traffic collision avoidance system / Secondary surveillance radar / ADS / Computer security

Intrusion Detection for Airborne Communication using PHY-Layer Information Martin Strohmeier1 , Vincent Lenders2 , Ivan Martinovic1 1

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2015-08-08 10:32:39
643Computing / Network architecture / Computer architecture / Denial-of-service attacks / Cyberwarfare / Emerging technologies / Internet Relay Chat / Network function virtualization / Software-defined networking / Denial-of-service attack / OpenFlow / Virtual firewall

Bohatei: Flexible and Elastic DDoS Defense Seyed K. Fayaz∗ Yoshiaki Tobioka∗ Vyas Sekar∗ ∗ CMU † UIUC

Add to Reading List

Source URL: mdbailey.ece.illinois.edu

Language: English - Date: 2015-08-05 21:41:25
644Computer network security / Computing / Computer security / Cyberwarfare / Firewall / Intrusion detection system / Outline of computer security / Wireless security

Invensys White Paper is now

Add to Reading List

Source URL: iom.invensys.com

Language: English - Date: 2015-05-08 05:42:47
645Cryptography / Cyberwarfare / Malware / Malware analysis / Encryption / Rootkit / HTTPS / Botnet / Block cipher / Advanced Encryption Standard / Cipher / Draft:Energy related security attacks

Institut für Technische Informatik und Kommunikationsnetze No´e Lutz

Add to Reading List

Source URL: www.kutter-fonds.ethz.ch

Language: English - Date: 2010-05-16 10:46:32
646Computing / Network architecture / Computer network security / OpenFlow / Cyberwarfare / OSI protocols / Transmission Control Protocol / Software-defined networking / SYN cookies / Denial-of-service attack / Data link layer / Forwarding plane

AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks Seungwon Shin† † Vinod Yegneswaran‡

Add to Reading List

Source URL: www.openflowsec.org

Language: English - Date: 2013-10-15 15:03:15
647Carnegie Mellon University / Cyberwarfare / Cybercrime / National security / Computer security / CERT Coordination Center / Computer emergency response team / International Multilateral Partnership Against Cyber Threats / United States Computer Emergency Readiness Team / National Cyber Security Division

JPCERT/CC Activities Overview [January 1, 2015 – March 31, 2015]

Add to Reading List

Source URL: www.jpcert.or.jp

Language: English - Date: 2015-06-29 21:38:08
648Computing / Cyberwarfare / World Wide Web / Web hosting / Cybercrime / Computer network security / Data management / Phishing / SQL injection / Web hosting service / Internet bot / Computer security

The Role of Web Hosting Providers in Detecting Compromised Websites Davide Canali Davide Balzarotti

Add to Reading List

Source URL: www2013.wwwconference.org

Language: English - Date: 2014-07-21 08:47:06
649Computing / Cyberwarfare / Computer security / Palamida / Hacking / Computer network security / Software testing / ASP.NET / Shellshock / Vulnerability

ENTERPRISE EDITION Datasheet ENTERPRISE EDITION AT A GLANCE An end-to-end system for

Add to Reading List

Source URL: www.palamida.com

Language: English - Date: 2015-06-17 16:42:29
UPDATE