Espionage

Results: 3893



#Item
561Steganalysis / Espionage / Steganography / XTR

LNCSA General Framework for Structural Steganalysis of LSB Replacement

Add to Reading List

Source URL: www.cs.ox.ac.uk

Language: English - Date: 2007-06-19 07:13:19
562Initialization vector / Known-plaintext attack / Stream cipher / Ciphertext / Cipher / Chosen-plaintext attack / Wireless Transport Layer Security / Transport Layer Security / Cryptography / Espionage / Cyberwarfare

Justifying Security Spending

Add to Reading List

Source URL: www.e-cop.net

Language: English - Date: 2011-04-26 10:48:38
563Steganography / Graphics file formats / Hypothesis testing / Steganalysis / Jessica Fridrich / Statistical classification / Receiver operating characteristic / JPEG / Bitmap / Statistics / Cryptography / Espionage

Improved Detection of LSB Steganography in Grayscale Images Andrew Ker

Add to Reading List

Source URL: www.cs.ox.ac.uk

Language: English - Date: 2006-07-16 07:26:30
564Malware / Spyware / Adware / Rogue software / Computer network security / Kazaa / Claria Corporation / Spybot – Search & Destroy / Origin / Espionage / System software / Software

Microsoft Word - SpywarePaperFinal.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-07-07 01:07:01
565Data collection / Military intelligence / Central Intelligence Agency / Counter-terrorism / National security / Espionage / Intelligence

The Analytical Units consists of the following: The Central Analysis Research Unit The Demographics Unit The Cyber Intelligence Unit The Gang Assessment Unit

Add to Reading List

Source URL: enemieswithinbook.com

Language: English - Date: 2013-08-31 14:43:45
566RSA / Fault injection / Cyberwarfare / Espionage / Mathematical sciences / Cryptography / Public-key cryptography / Elliptic curve cryptography

Protecting Elliptic Curve Cryptography Against Fault Injection Attacks Location. SEN group of the COMELEC department at Telecom ParisTech (37 rue Dareau, 75014, Paris). This internship can lead to a PhD thesis. Advisors.

Add to Reading List

Source URL: perso.telecom-paristech.fr

Language: English - Date: 2015-01-08 09:02:28
567Cyberwarfare / Side channel attack / Power analysis / Cryptographic engineering / Timing attack / Randomness / Lecture Notes in Computer Science / Computer security / Espionage / Cryptography / Security

Formal Study of a Countermeasure Against Side-Channel Attacks Location. SEN group of the COMELEC department at Telecom ParisTech (37 rue Dareau, 75014, Paris). This internship can lead to a PhD thesis. Advisors.

Add to Reading List

Source URL: perso.telecom-paristech.fr

Language: English - Date: 2015-01-06 18:40:44
568Evaluation methods / Research methods / Honeypot / Statistics / Espionage / Questionnaire / Clandestine HUMINT asset recruiting / Survey methodology / Client honeypot / Computer network security / Spamming / Science

Microsoft Word - surveys_diffs.doc

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-04-04 11:41:11
569Computer network security / Rogue software / Spyware / Computer crimes / Adware / Keystroke logging / Internet security / Internet privacy / Privacy-invasive software / Espionage / System software / Malware

9 Spyware: An Emerging Threat Brent A. Atchley and Allen R. Lee Spyware Overview The year is 2004, and the United States Government has enacted

Add to Reading List

Source URL: www.ethicapublishing.com

Language: English - Date: 2009-02-01 12:25:12
570Surveillance / Crime prevention / Law enforcement / Closed-circuit television / Mass surveillance / Covert listening device / Technical surveillance counter-measures / Workplace surveillance / Telephone tapping / Espionage / Security / National security

10 The Ethics of Audio and Visual Surveillance: Who’s Watching and Why Nicholas Manning Hamilton and Matthew R. Wright Audio and Visual Surveillance

Add to Reading List

Source URL: www.ethicapublishing.com

Language: English - Date: 2009-02-01 12:25:12
UPDATE