Espionage

Results: 3893



#Item
541Espionage / ESET / Spam / Malware / Anti-spam techniques / Email spam / Botnet / Backdoor / ESET NOD32 / Spamming / Computing / Internet

Mumblehard targets servers running Linux and BSD

Add to Reading List

Source URL: techxplore.com

Language: English - Date: 2015-05-16 13:25:30
542Elliptic curve cryptography / Reconfigurable computing / Power analysis / Side channel attack / Multiplication / Field-programmable gate array / Advanced Encryption Standard / Elliptic curve point multiplication / Xilinx / Cryptography / Mathematics / Espionage

Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks Zoya Dyka, Thomas Basmer, Christian Wittke and Peter Langendoerfer System dept., IHP Frankfurt(Oder), Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-08 10:18:14
543Steganography / Statistical inference / Steganalysis / Statistical theory / Estimation theory / Kullback–Leibler divergence / Jessica Fridrich / Information theory / Normal distribution / Cryptography / Statistics / Espionage

The Ultimate Steganalysis Benchmark? Andrew D. Ker Oxford University Computing Laboratory Parks Road Oxford OX1 3QD, UK

Add to Reading List

Source URL: www.cs.ox.ac.uk

Language: English - Date: 2007-09-22 14:51:12
544Signals intelligence / Military intelligence / Intelligence / Mass surveillance / Central Intelligence Agency / United States Intelligence Community / Director of Central Intelligence / Counterintelligence / National Security Agency / National security / Espionage / Data collection

Signals Intelligence Activities While protecting our nation through the collection of signals intelligence (SIGINT) as authorized by law and policy, the Central Intelligence Agency (CIA), referred to herein as the "Agenc

Add to Reading List

Source URL: www.dni.gov

Language: English - Date: 2015-02-02 14:08:44
545Surveillance / Foreign Intelligence Surveillance Act / Trap and trace device / Central Intelligence Agency / Pen register / Counterintelligence / Section summary of the USA PATRIOT Act /  Title II / USA PATRIOT Act /  Title II / Privacy of telecommunications / National security / Espionage

U.S. Department of Justice Office of Intelligence Policy and Review Washingtoll. D.Cb) (6), (b) (7)(C)

Add to Reading List

Source URL: www.epic.org

Language: English - Date: 2014-03-19 11:13:14
546Espionage / Mass surveillance / Signals intelligence / Surveillance / Foreign Intelligence Surveillance Act / Pen register / Central Intelligence Agency / Federal Bureau of Investigation / Classified information / National security / Privacy of telecommunications / Security

TOP 8ECRETHCOMINT//ORCON,NOFOR~ 1· SEMIANNUAL REPORT OF THE ATTORNEY GENERAL ON ELECTRONIC SURVEILLANCE AND PHYSICAL SEARCH UNDER

Add to Reading List

Source URL: epic.org

Language: English - Date: 2014-03-19 11:19:04
547Enigma machine / Espionage / Cryptography / Epilepsy / Health

Enhancing  Neuroimaging  Genetics   through  Meta-­‐Analysis  (ENIGMA)     Epilepsy  Working  Group    

Add to Reading List

Source URL: enigma.ini.usc.edu

Language: English - Date: 2015-04-23 13:44:20
548Operating system / Firmware / Device driver / Software protection dongle / IBM / Computer security / Software / Embedded system / Secure cryptoprocessor / Computing / Security / Espionage

COVER FEATURE Building the IBM 4758 Secure Coprocessor Meeting the challenge of building a user-configurable secure coprocessor

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-18 17:47:54
549Information sensitivity / Ethics / National security / Intellectual property law / Espionage / WikiLeaks / Computer Fraud and Abuse Act / Trade secret / Computer fraud / Security / Information technology audit / World Wide Web

10 NORTH PEARL STREET* 4th FLOOR* ALBANY, NY 12207* * FAX

Add to Reading List

Source URL: pmcdeadline2.files.wordpress.com

Language: English - Date: 2015-04-17 20:44:54
550Networks / Network theory / Crime prevention / Law enforcement / Link analysis / Surveillance / Analysis / Traffic analysis / MI5 / Espionage / National security / Security

CONNECTIONS 24(3): 66-78 © 2002 INSNA http://www.sfu.ca/~insna/Connections-Web/Volume24-3/Karl.van.Meter.web.pdf Terrorists/Liberators: Researching and dealing

Add to Reading List

Source URL: www.insna.org

Language: English - Date: 2014-09-27 18:37:12
UPDATE