Cyberwarfare

Results: 11990



#Item
701Cyberwarfare / Computer security / Denial-of-service attack / Internet Relay Chat / OpenFlow / Network security / Computer network / Tor / NTP server misuse and abuse / Denial-of-service attacks / Computer network security / Computing

Poster: Denial of Service Defence using Router Migration Jonathan Weekes, Shishir Nagaraja Security Lancaster Research Centre Lancaster University United Kingdom, LA1 4WA

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:34
702Crime prevention / National security / Computer network security / Electronic commerce / Secure communication / Vulnerability / Security / Cyberwarfare / Computer security

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2012-10-11 06:23:09
703Failure / Cross-site scripting / Vulnerability / SQL injection / Fault injection / Dolev-Yao model / Model-based testing / Remote file inclusion / Code injection / Software testing / Cyberwarfare / Computer security

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2012-10-11 06:26:07
704Security / Hacking / Software testing / National security / Vulnerability / Exploit / Attack / Threat / Zero-day attack / Computer network security / Cyberwarfare / Computer security

  Christian  Gehl   Co-­‐Founder    &  CEO     www.trifense.com  

Add to Reading List

Source URL: www.europa.brandenburg.de

Language: English - Date: 2012-06-20 09:00:08
705Crime / National security / Electronic warfare / Hacking / Military technology / Computer security / International Multilateral Partnership Against Cyber Threats / Cyberterrorism / Legal aspects of computing / Computer crimes / Cyberwarfare / Security

KENYA CYBER SECURITY REPORT 2014 Rethinking Cyber Security – “An Integrated Approach: Processes, Intelligence and Monitoring.”

Add to Reading List

Source URL: www.usalama.co.ke

Language: English - Date: 2014-06-09 08:57:31
706National security / Cyber security standards / Royal Dutch Shell / Security / Cyberwarfare / Computer security

Wurldtech™ And Shell Cooperate To Drive Security March 31, 2009 Industrial Cyber-Security Pioneer Provides Testing And Certification Solutions To Proactively Diagnose, Mitigate And Manage Cyber Risk Throughout Upstream

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:14
707Cyberwarfare / Malware / Computer virus / Threat / Avira / Data mining / Antivirus software / Computer security / System software

CYLANCE INFINITY ENGINE Key Benefits 1. Game-changing malware detection - CylanceINFINITYENGINE identifies threats in Windows Portable Executables, PDFs, and Microsoft Office documents using predictive models which can c

Add to Reading List

Source URL: cdn2.hubspot.net

Language: English - Date: 2015-05-01 19:03:47
708Cyberwarfare / University of California / Vulnerability / Association of Public and Land-Grant Universities / Security / Computer security

Patch-and-Catch Matt Bishop Department of Computer Science University of California at Davis Davis, CAemail:

Add to Reading List

Source URL: seclab.cs.ucdavis.edu

Language: English - Date: 2004-06-21 18:55:46
709Political philosophy / Sociology / European Union / Federalism / Cyberwarfare

No. 64 June 2015 Hybrid Hysteria Sven Biscop

Add to Reading List

Source URL: www.egmontinstitute.be

Language: English - Date: 2015-06-03 06:59:08
710Computer security / Crime prevention / National security / Secure communication / Certification / Cyberwarfare / Computer network security / Security / Electronic commerce

ISA Security Compliance Institute and Wurldtech Partnership October 25, 2010 From ISA Press Release Research Triangle Park, North Carolina, USA (25 October 2010) –The ISA Security Compliance Institute (ISCI) and Wurldt

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:14
UPDATE