Cyberwarfare

Results: 11990



#Item
771Security / Penetration test / Model-based testing / Validation / Vulnerability / Model checking / Software development process / Security testing / Software testing / Computer security / Cyberwarfare

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2012-10-13 08:46:57
772SCADA / Data mining / Hacking / Anomaly detection / DNP3 / Stuxnet / Malware / Cyberwarfare / Network Behavior Anomaly Detection / Technology / Telemetry / Industrial automation

Industrial_Diagram_Draft4

Add to Reading List

Source URL: www.thetaray.com

Language: English - Date: 2014-12-06 20:00:27
773Computing / Data security / Firewall / Rootkit / Personal firewall / Distributed firewall / Application firewall / Computer network security / Cyberwarfare / Computer security

Introduction Current personal firewalls are focused on combating usermode malware What about protection against rootkits?

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:42
774Software testing / Computer network security / Electronic warfare / W3af / Vulnerability / Fuzz testing / JavaScript / HTTP cookie / World Wide Web / Computer security / Cyberwarfare / Computing

figures/code_coverage_graph.tex

Add to Reading List

Source URL: www.usenix.org

Language: English
775Security / Penetration test / Vulnerability / Security testing / Test automation / Framework Programmes for Research and Technological Development / Software testing / Computer security / Cyberwarfare

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2014-02-10 06:15:57
776Malware / Crime / Cyberwarfare / Ethics / Pharming / Vishing / Internet Identity / Spy-phishing / Social engineering / Spamming / Phishing

Anti-Phishing Cyveillance Anti-Phishing solutions protect your business from the earliest stages of a phishing attack, including pharming and malware, to the takedown and removal of phishing websites. This turnkey soluti

Add to Reading List

Source URL: info.cyveillance.com

Language: English - Date: 2015-07-18 14:54:27
777Cyberwarfare / CERT Polska / Malware / Naukowa i Akademicka Sieć Komputerowa / Denial-of-service attack / Botnet / Conficker / Internet security / Microsoft Security Essentials / Computer network security / System software / Computing

CERT POLSKA REPORT 2014 CERT Polska Report 2014 Publisher:

Add to Reading List

Source URL: www.cert.pl

Language: English - Date: 2015-06-01 02:28:04
778Technology / Electric power distribution / Emerging technologies / Smart grid / European Network and Information Security Agency / Smart meter / Cyberwarfare / Electrical grid / Electric power transmission / Energy / Electromagnetism / Electric power transmission systems

1 Appropriate security measures for smart grids Guidelines to assess the sophistication of security measures implementation]

Add to Reading List

Source URL: www.cockpitci.eu

Language: English - Date: 2014-03-25 07:46:38
779Cyberwarfare / ISO/IEC 27001 / Reliability engineering / Systems engineering / Computer security / Computing / Cyber security standards

Achilles Practices Certification Achilles® Practices Certification ensures device manufacturers include cyber security best practices in the processes and procedures used to develop their products. Background

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:12
780Evaluation / Emerging technologies / Technology / Computer security / Cyber security standards / Cyberwarfare / Ambient intelligence / Smart grid / Certification / Standards / Electric power transmission systems / Security

Sensus First AMI Vendor to Recieve Achilles Practices Certification February 14, 2011 Sensus is the first Advanced Metering Infrastructure (AMI) company to achieve overall cyber security certification after an eight-mont

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:14
UPDATE