Cyberwarfare

Results: 11990



#Item
751IP address / Transmission Control Protocol / Computing / Cyberwarfare / Application firewall / Computer security / Attack patterns

Poster: An Automatic Multi-Step Attack Pattern Mining Approach for Massive WAF Alert Data Yang Zhang1,2 , Tingwen Liu1,2 , Jinqiao Shi1,2 , Panpan Zhang1,2 , Haoliang Zhang1,2 , Jing Ya1,2 1 Institute of Information Eng

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:24
752Cybernetics / Science / Computer security / Control engineering / Hacking / Access control / Cyberwarfare / Controller / Control system / Technology / Security / Automation

Paper Title (use style: paper title)

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:47
753Computer security / Server appliance / Spamming / Email / Web threat / WatchGuard / Malware / Cloud computing / Threat / Computing / Computer network security / Cyberwarfare

Security from Above: How Cloud-based Security Delivers Up-to-the-Minute Network Protection

Add to Reading List

Source URL: www.tentonmarketing.com

Language: English - Date: 2014-12-17 12:44:00
754Evaluation / Computer network security / Standards / Hacking / Vulnerability / Certification / Software testing / Cyberwarfare / Computer security

The HIMA HIMax Is Achilles Certified! June 23, 2010 The Wurldtech certification team is pleased to announce the 20th Achilles certified industrial control system. The HIMax safety controller from HIMA has achieved the in

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:12
755System software / Cyberwarfare / Network management / Netflow / IP Flow Information Export / Wireless networking / Traffic flow / Pcap / Packet analyzer / Computing / Computer network security / Software

Microsoft PowerPoint - mnet_07_Measurements

Add to Reading List

Source URL: www.net.in.tum.de

Language: English - Date: 2010-12-17 04:04:23
756Computer security / Spyware / Rootkits / Joanna Rutkowska / Year of birth missing / Rutkowski / Backdoor / Computer virus / Keystroke logging / Espionage / Cyberwarfare / Malware

Rootkits vs. Stealth by Design Malware Joanna Rutkowska invisiblethings.org Black Hat Europe 2006, Amsterdam, the Netherlands

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:30
757Rootkits / Stuxnet / Computer security / Cyberwarfare / Security / Nuclear program of Iran

Cyber Security Answers Come From A Team Approach October 21, 2010 When it comes to cyber security for manufacturers, there is no one single superstar that can solve all the problems. Rather, it is a concerted effort by a

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:14
758Industrial automation / SCADA / Telemetry / National security / Software requirements / Stuxnet / Computer security / International Multilateral Partnership Against Cyber Threats / Requirement / Technology / Cyberwarfare / Security

Type Project Title Classification FP7-SECProject

Add to Reading List

Source URL: www.cockpitci.eu

Language: English - Date: 2015-04-04 09:29:24
759Crime prevention / National security / Computer network security / Software testing / Vulnerability / Computer worm / Peer-to-peer / Malware / Information security / Security / Computer security / Cyberwarfare

DRAFT DRAFT Peer Production of Privacy and Security Information L Jean Camp*

Add to Reading List

Source URL: www.ljean.com

Language: English - Date: 2013-08-22 12:18:46
760Cryptographic hash function / Crypt / Cyberwarfare / Computer security / Security / Cryptography / Public-key cryptography / File system

CS140 Operating Systems and Systems Programming Final Exam December 12, 2005 Name: (please print)______________________________ In recognition of and in the spirit of the Stanford University Honor Code, I certify

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2009-12-29 17:31:12
UPDATE