Information security

Results: 50180



#Item
41ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security STATUS: Approved

ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security STATUS: Approved

Add to Reading List

Source URL: its.truman.edu

Language: English - Date: 2015-09-04 15:23:08
    42492  IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 3, SEPTEMBER 2009 Channel-Based Detection of Sybil Attacks in Wireless Networks

    492 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 3, SEPTEMBER 2009 Channel-Based Detection of Sybil Attacks in Wireless Networks

    Add to Reading List

    Source URL: www.winlab.rutgers.edu

    Language: English - Date: 2010-10-13 17:15:15
      43Improved Information Set Decoding Decoding Random Linear Codes in O(20.054n) Alexander May, Alexander Meurer, Enrico Thomae ASIACRYPT 2011, Seoul  HORST GÖRTZ INSTITUTE FOR IT-SECURITY

      Improved Information Set Decoding Decoding Random Linear Codes in O(20.054n) Alexander May, Alexander Meurer, Enrico Thomae ASIACRYPT 2011, Seoul HORST GÖRTZ INSTITUTE FOR IT-SECURITY

      Add to Reading List

      Source URL: www5.rz.rub.de

      Language: English - Date: 2011-12-05 07:34:34
        44Malicious Threat Detection  3 reasons why you want to integrate breach detection into a SIEM solution  Many companies rely on a Security Information and Event Management (SIEM)

        Malicious Threat Detection 3 reasons why you want to integrate breach detection into a SIEM solution Many companies rely on a Security Information and Event Management (SIEM)

        Add to Reading List

        Source URL: www.redsocks.eu

        Language: English - Date: 2018-08-06 04:35:01
          45For more information, visit: www.caci.com/Cyber_Security Cyber Security  CACI drives breakthrough solutions by combining our years of cyber

          For more information, visit: www.caci.com/Cyber_Security Cyber Security CACI drives breakthrough solutions by combining our years of cyber

          Add to Reading List

          Source URL: www.caci.com

          Language: English - Date: 2018-05-07 14:00:34
            46Supported by   ▪ http://sgcsc.sg O BJECTIVES  Promote a virtuous cycle of innovation in information security by setting up a seamless

            Supported by ▪ http://sgcsc.sg O BJECTIVES  Promote a virtuous cycle of innovation in information security by setting up a seamless

            Add to Reading List

            Source URL: sgcsc.sg

            Language: English - Date: 2017-07-04 01:59:59
              47System Design & Assessment Note SDAN 48 Remote and Silent Voice Command Injection on a Smartphone through Conducted IEMI Threats of Smart IEMI for Information Security José Lopes Esteves and Chaouki Kasmi

              System Design & Assessment Note SDAN 48 Remote and Silent Voice Command Injection on a Smartphone through Conducted IEMI Threats of Smart IEMI for Information Security José Lopes Esteves and Chaouki Kasmi

              Add to Reading List

              Source URL: ece-research.unm.edu

              Language: English - Date: 2018-05-21 18:44:17
                48Infosec Cloud General Data Protection Regulation (GDPR) Statement Executive Summary Infosec Cloud welcomes the introduction of the GDPR in MayInfosec Cloud has always taken all information security seriously, incl

                Infosec Cloud General Data Protection Regulation (GDPR) Statement Executive Summary Infosec Cloud welcomes the introduction of the GDPR in MayInfosec Cloud has always taken all information security seriously, incl

                Add to Reading List

                Source URL: www.infosec-cloud.com

                Language: English - Date: 2018-02-12 05:36:05
                  49Comments of THE ELECTRONIC PRIVACY INFORMATION CENTER (EPIC) to THE NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE, DEPARTMENT OF DEFENSE [Docket ID: DoD-2015-OS-0100]

                  Comments of THE ELECTRONIC PRIVACY INFORMATION CENTER (EPIC) to THE NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE, DEPARTMENT OF DEFENSE [Docket ID: DoD-2015-OS-0100]

                  Add to Reading List

                  Source URL: www.epic.org

                  Language: English - Date: 2016-02-22 14:56:38
                    50Impossibility of Precise and Sound Termination Sensitive Security Enforcements Anonymous Author(s) Abstract—An information flow policy is termination sensitive if it imposes that the termination behavior of programs is

                    Impossibility of Precise and Sound Termination Sensitive Security Enforcements Anonymous Author(s) Abstract—An information flow policy is termination sensitive if it imposes that the termination behavior of programs is

                    Add to Reading List

                    Source URL: www-sop.inria.fr

                    Language: English - Date: 2018-03-27 09:23:29