Cyberwarfare

Results: 11990



#Item
651Computer network security / Multipath TCP / Transmission Control Protocol / Cyberwarfare / Network address translation / Network performance / Transport layer / Firewall / TCP offload engine / TCP reset attack

A first look at real Multipath TCP traffic B. Hesmans, H. Tran-Viet, R. Sadre, O. Bonaventure ICTEAM, Universit´e catholique de Louvain, Louvain-la-Neuve, Belgium Abstract. Multipath TCP is a new TCP extension that attr

Add to Reading List

Source URL: inl.info.ucl.ac.be

Language: English - Date: 2016-03-04 17:10:41
652Security / Espionage / Cyberwarfare / Computer network security / Military intelligence / Threat / Computer security / Draft:Threat Intelligence Analyst / Threat Intelligence Platform

AbuseSA Frequently Asked Questions AbuseSA is the cornerstone to an intelligence-driven strategy strategy to help governments and CERTs to rapidly respond to abusive activity. The situational awareness solution provides

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:14
653Security / Computer security / Software testing / Cyberwarfare / Codenomicon / Computer network security / Cyber-attack

Codenomicon-AppCheck-Symbol-Lock

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:12
654Cyberwarfare / Security / Education / Distance education / Computer network security / Computer security / Cryptography / National security / Educational technology

This toolkit will quickly point you to the resources you need to help you perform your role in Cybersecurity. Do you have a question about how to do something or need more information about a topic? Select a category bel

Add to Reading List

Source URL: www.delawareptac.org

Language: English - Date: 2015-10-09 08:58:30
655Health / Prevention / Security / Food and Drug Administration / Cyberwarfare / Medical technology / Medical device / Medical equipment / Pharmaceuticals policy / Risk management / Computer security / Control system security

Content of Premarket Submissions for Management of Cybersecurity in Medical Devices Guidance for Industry and Food and Drug Administration Staff Document Issued on: October 2, 2014

Add to Reading List

Source URL: www.fda.gov

Language: English
656Espionage / Computer security / Cyberwarfare / Computer network security / Trojan horses / Identity theft / Rogue software / Spyware / Morgan Marquis-Boire / Hacking Team / Proxy server / Citizen Lab

Research Brief March 2014 The Citizen Lab Hacking Team’s US Nexus

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2015-03-18 14:57:24
657Computer security / Cyberwarfare / Cryptography / Security / Password / Key management / Cross-site request forgery / Crypt / Passwd / SQL injection / Cross-site scripting / Code injection

Business Logic Security Ilia Alshanetsky @iliaa https://joind.in/14863 whois: Ilia Alshanetsky

Add to Reading List

Source URL: ilia.ws

Language: English - Date: 2015-09-26 04:23:31
658Network performance / Cyberwarfare / Denial-of-service attacks / Pseudorandom number generator / Measuring network throughput / Network packet / Denial-of-service attack / Network telescope / Witty / Transmission Control Protocol / Code Red / Packet loss

Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event Abhishek Kumar Georgia Institute of Technology

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:03
659Ransomware / Computing / Cyberwarfare / Computer security / Malware / Cybereason / Portable Document Format

Operation Kofer: Mutating Ransomware Enters the Fray By: Uri Sternfeld, Senior Security Researcher

Add to Reading List

Source URL: go.cybereason.com

Language: English - Date: 2016-02-28 19:36:12
UPDATE