Cyberwarfare

Results: 11990



#Item
851Military science / United Nations General Assembly observers / Military / Military of Russia / Department of Defense Strategy for Operating in Cyberspace / Information warfare / Armed Forces of the Russian Federation / Cyberterrorism / Cyberspace / Cyberwarfare / International relations / Computer crimes

CyCon_2012_book_web_sisu.indd

Add to Reading List

Source URL: www.conflictstudies.org.uk

Language: English - Date: 2012-07-17 05:31:37
852Cyberwarfare / Computer security / Data security / Denial-of-service attacks / Denial-of-service attack / Stateful firewall / Firewall / Port / Transmission Control Protocol / Computer network security / Computing / Internet protocols

CS 161 Computer Security Spring 2010

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2010-03-07 17:20:29
853Cyberwarfare / Computer security / Ifconfig / Password / Hacker / Network security / Rootkits / Trojan horses / System software / Computing / Malware

Intruders and UNIX Matt Bishop Department of Computer Science University of California Davis, CAphone: (

Add to Reading List

Source URL: seclab.cs.ucdavis.edu

Language: English - Date: 2004-06-21 18:55:43
854Computer security / Hardware Trojan / Field-programmable gate array / Physical Unclonable Function / Cyberwarfare / Security / Fault injection / Software testing

www.cost.eu/ict COST Action no. IC1204 2012⏐2016

Add to Reading List

Source URL: w3.cost.eu

Language: English - Date: 2013-05-30 08:33:11
855Computing / Malware / Rootkit / Host Based Security System / Computer virus / Computer security / Antivirus software / Cyberwarfare

Microsoft®’s Enhanced Mitigation Experience Toolkit (EMET) is an enhancement to the Windows® operating system that stops broad classes of malware from executing. EMET implements a set of anti-exploitation mitigation

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2015-01-16 11:37:31
856Malware / Cyberwarfare / Computer network security / Multi-agent systems / Spamming / Rootkit / Computer virus / Computer worm / Botnet / Antivirus software / System software / Computer security

Malware Trend Report, Q1 2014 January | February | March 22 April 2014 Copyright RedSocks B.V. © 2014. All Rights Reserved.

Add to Reading List

Source URL: www.redsocks.nl

Language: English - Date: 2015-06-17 02:25:38
857Computer security / Crime prevention / National security / Information technology management / Vulnerability / Information security / Attack / Procurement / Multifunction printer / Security / Cyberwarfare / Computer network security

Vulnerability-centric assurance activities for MFP PP as a candidate for cPP Fumiaki Manabe JISEC / IPA, Japan

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2013-08-02 03:54:36
858Computer network security / Computing / Multi-agent systems / Botnet / Trinoo / Denial-of-service attack / Computer insecurity / Password / Malware / Denial-of-service attacks / Cybercrime / Cyberwarfare

T h e r e i s i n c r e a s i n g ta l k o f c y b e r Dav i d D i t t r i ch the conflicts facing those responding to cyberconflict Dave Dittrich holds an appointment as an

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2009-12-01 11:51:21
859Crime / Electronic warfare / Military technology / Criminology / Military science / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Cyberwarfare / Hacking

Cyber Security WeekApril Showcasing the Strength of Dutch Cyber Security Innovations and Knowledge In the same week as the Global Conference on Cyber Space 2015 and the NCSC One Conference, a unique ‘Cyber Secur

Add to Reading List

Source URL: www.westholland.cn

Language: English - Date: 2015-03-31 09:09:36
860Malware / Credit card fraud / Authentication / Virtual private network / Computer security / Cyberwarfare / Computer network security / Security / Internet privacy

Safeguarding Academic Accounts and Resources with the University Credential Abuse Auditing System

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2014-08-05 13:28:18
UPDATE