Defense

Results: 55897



#Item
1Abu Ghraib torture and prisoner abuse / CACI / Health informatics / Defense Health Agency / Health data

For more information, visit: www.caci.com/Health Health CACI supports the Department of Defense and civilian health agency

Add to Reading List

Source URL: www.caci.com

Language: English - Date: 2018-06-28 12:52:54
2Computer access control / Cryptography / Computer security / Access control / Multi-factor authentication / Authentication / Transaction authentication number / QR code

FACT SHEET IOT DEVICE AUTHENTICATION Invisible Line of Defense to keep intruders out of your personal data

Add to Reading List

Source URL: futurae.com

Language: English - Date: 2018-10-17 07:54:29
3Computer network security / Computing / Cyberwarfare / Multi-agent systems / Spamming / Cybercrime / Botnet / Influence diagram / Bayesian network / Computer security

Poster: Bottleneck: A Generalized, Flexible, and Extensible Framework for Botnet Defense Naurin Rasheed Ramay∗ , Sheharbano Khattak† , Affan A. Syed‡ Syed Ali Khayam§

Add to Reading List

Source URL: sheharbano.com

Language: English - Date: 2017-02-16 07:58:24
4Computing / Internet / Network performance / Network architecture / Internet protocols / Internet Standards / Internet privacy / Secure communication / Transmission Control Protocol / SOCKS / Tor / TCP congestion control

CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense Xiang Cai Rishab Nithyanand

Add to Reading List

Source URL: www.freehaven.net

Language: English - Date: 2015-07-10 12:47:16
5Government / Military / Militaryindustrial complex / United States Department of Defense / United States Department of Homeland Security / United States National Guard / Virginia Governor's Cabinet / Organizational structure of the United States Department of Defense

Microsoft Word - EO 20 Transfer Of The Department Of Military Affairs To The Secretary Of Veterans And Defense Affairs.docx

Add to Reading List

Source URL: www.governor.virginia.gov

Language: English - Date: 2018-09-24 13:55:58
6Machine learning / Learning / Artificial intelligence / Artificial neural networks / Computational neuroscience / Autoencoder / Unsupervised learning / Adversarial machine learning / Statistical classification / Deep learning / Classifier / Softmax function

MagNet: a Two-Pronged Defense against Adversarial Examples

Add to Reading List

Source URL: acmccs.github.io

Language: English - Date: 2017-12-30 21:51:58
7Computer security / Computing / Compiler construction / Computer programming / Software engineering / Return-oriented programming / Control-flow integrity / Code reuse / Control flow graph / Program analysis / Data-flow analysis / Cyberattack

Poster: CRAFTED: Code Reuse Analysis for Trusted and Effective Defense Ethan Johnson Tianqin Zhao John Criswell

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 00:24:54
8HackerOne

HACKERONE CHALLENGE CUSTOMER TESTIMONIALS ackerOne Challenge customers—from the U.S. Department of Defense and the U.S. Air Force, to GitHub

Add to Reading List

Source URL: www.hackerone.com

Language: English - Date: 2018-06-27 13:07:52
    9

    PDF Document

    Add to Reading List

    Source URL: www.servicehistorique.sga.defense.gouv.fr

    - Date: 2015-08-12 08:26:06
      10

      PDF Document

      Add to Reading List

      Source URL: cesm.marine.defense.gouv.fr

      - Date: 2016-06-30 10:04:22
        UPDATE