Defense

Results: 55897



#Item
1For more information, visit: www.caci.com/Health Health  CACI supports the Department of Defense and civilian health agency

For more information, visit: www.caci.com/Health Health CACI supports the Department of Defense and civilian health agency

Add to Reading List

Source URL: www.caci.com

Language: English - Date: 2018-06-28 12:52:54
2FACT SHEET  IOT DEVICE AUTHENTICATION Invisible Line of Defense to keep intruders out of your personal data

FACT SHEET IOT DEVICE AUTHENTICATION Invisible Line of Defense to keep intruders out of your personal data

Add to Reading List

Source URL: futurae.com

Language: English - Date: 2018-10-17 07:54:29
3Poster: Bottleneck: A Generalized, Flexible, and Extensible Framework for Botnet Defense Naurin Rasheed Ramay∗ , Sheharbano Khattak† , Affan A. Syed‡  Syed Ali Khayam§

Poster: Bottleneck: A Generalized, Flexible, and Extensible Framework for Botnet Defense Naurin Rasheed Ramay∗ , Sheharbano Khattak† , Affan A. Syed‡ Syed Ali Khayam§

Add to Reading List

Source URL: sheharbano.com

Language: English - Date: 2017-02-16 07:58:24
4CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense Xiang Cai Rishab Nithyanand

CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense Xiang Cai Rishab Nithyanand

Add to Reading List

Source URL: www.freehaven.net

Language: English - Date: 2015-07-10 12:47:16
5Microsoft Word - EO 20 Transfer Of The Department Of Military Affairs To The Secretary Of Veterans And Defense Affairs.docx

Microsoft Word - EO 20 Transfer Of The Department Of Military Affairs To The Secretary Of Veterans And Defense Affairs.docx

Add to Reading List

Source URL: www.governor.virginia.gov

Language: English - Date: 2018-09-24 13:55:58
6MagNet: a Two-Pronged Defense against Adversarial Examples

MagNet: a Two-Pronged Defense against Adversarial Examples

Add to Reading List

Source URL: acmccs.github.io

Language: English - Date: 2017-12-30 21:51:58
7Poster: CRAFTED: Code Reuse Analysis for Trusted and Effective Defense Ethan Johnson Tianqin Zhao  John Criswell

Poster: CRAFTED: Code Reuse Analysis for Trusted and Effective Defense Ethan Johnson Tianqin Zhao John Criswell

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 00:24:54
8HACKERONE CHALLENGE CUSTOMER TESTIMONIALS ackerOne Challenge customers—from the U.S. Department of Defense and the U.S. Air Force, to GitHub

HACKERONE CHALLENGE CUSTOMER TESTIMONIALS ackerOne Challenge customers—from the U.S. Department of Defense and the U.S. Air Force, to GitHub

Add to Reading List

Source URL: www.hackerone.com

Language: English - Date: 2018-06-27 13:07:52
    9

    PDF Document

    Add to Reading List

    Source URL: www.servicehistorique.sga.defense.gouv.fr

    - Date: 2015-08-12 08:26:06
      10

      PDF Document

      Add to Reading List

      Source URL: cesm.marine.defense.gouv.fr

      - Date: 2016-06-30 10:04:22