Internet security

Results: 20779



#Item
1Poster: Browser’s ”search form” issues and countermeasures Yuji Suga  Internet Initiative Japan Inc., Iidabashi Grand Bloom, Fujimi, Chiyoda-ku, , Japan Abstract—From 2014, we are con

Poster: Browser’s ”search form” issues and countermeasures Yuji Suga Internet Initiative Japan Inc., Iidabashi Grand Bloom, Fujimi, Chiyoda-ku, , Japan Abstract—From 2014, we are con

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-15 11:54:40
2The SCION Internet Architecture An Internet Architecture for the 21st Century David Barrera, Laurent Chuat, Adrian Perrig, Raphael M. Reischuk, Pawel Szalachowski Network Security Group, ETH Zurich, Switzerland March 6,

The SCION Internet Architecture An Internet Architecture for the 21st Century David Barrera, Laurent Chuat, Adrian Perrig, Raphael M. Reischuk, Pawel Szalachowski Network Security Group, ETH Zurich, Switzerland March 6,

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
3Federal Register / Vol. 66, NoMonday, March 12, Notices institution. The respondents are Social Security beneficiaries who use the Internet to enroll in DD/EFT. Number of Respondents: 3,485. Frequency of Re

Federal Register / Vol. 66, NoMonday, March 12, Notices institution. The respondents are Social Security beneficiaries who use the Internet to enroll in DD/EFT. Number of Respondents: 3,485. Frequency of Re

Add to Reading List

Source URL: 34.232.160.87

Language: English - Date: 2017-07-06 11:25:58
4Application Security—Made in Switzerland  Overview The problem of internet security is almost as old as the internet itself. But there is a reliable solution: Airlock Suite from Ergon. Airlock Suite is underpinned by

Application Security—Made in Switzerland Overview The problem of internet security is almost as old as the internet itself. But there is a reliable solution: Airlock Suite from Ergon. Airlock Suite is underpinned by

Add to Reading List

Source URL: www.airlock.com

Language: English - Date: 2016-09-15 09:49:08
5Poster: Understanding Free-riding Attacks in Internet Zero-rating Services Zhiheng Liu, Zhen Zhang, Shihao Jing, Zhaohan Xi and Yinzhi Cao Lehigh University 27 Memorial Dr W, Bethlehem, PA, USA [zhl416][zhza16][shj316][z

Poster: Understanding Free-riding Attacks in Internet Zero-rating Services Zhiheng Liu, Zhen Zhang, Shihao Jing, Zhaohan Xi and Yinzhi Cao Lehigh University 27 Memorial Dr W, Bethlehem, PA, USA [zhl416][zhza16][shj316][z

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 04:51:38
6Augur: Internet-Wide Detection of Connectivity Disruptions Paul Pearce†∗ , Roya Ensafi§∗ , Frank Li† , Nick Feamster§ , Vern Paxson† † University  of California, Berkeley § Princeton University

Augur: Internet-Wide Detection of Connectivity Disruptions Paul Pearce†∗ , Roya Ensafi§∗ , Frank Li† , Nick Feamster§ , Vern Paxson† † University of California, Berkeley § Princeton University

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:56:26
7How to install Internet Security for Android How to install the app from Google Play.

How to install Internet Security for Android How to install the app from Google Play.

Add to Reading List

Source URL: www.thaikaspersky.com

Language: English - Date: 2017-10-04 05:17:39
    8CSComputer Security and Privacy Module 5 Internet Application Security and Privacy Winter 2011

    CSComputer Security and Privacy Module 5 Internet Application Security and Privacy Winter 2011

    Add to Reading List

    Source URL: crysp.uwaterloo.ca

    Language: English - Date: 2018-08-13 15:14:12
      9Proceedings of the Internet Society Network and Distributed System Security Symposium (NDSS 2001), February 2001, ppEfficient and Secure Source Authentication for Multicast Adrian Perrig  

      Proceedings of the Internet Society Network and Distributed System Security Symposium (NDSS 2001), February 2001, ppEfficient and Secure Source Authentication for Multicast Adrian Perrig 

      Add to Reading List

      Source URL: people.csail.mit.edu

      Language: English - Date: 2008-10-12 11:59:02
        10SCADA And Mobile Security In The Internet Of Things Era Alexander Bolshev (dark_k3y) Security Consultant, IOActive Ivan Yushkevich (Steph) Information Security Auditor, Embedi  Abstract

        SCADA And Mobile Security In The Internet Of Things Era Alexander Bolshev (dark_k3y) Security Consultant, IOActive Ivan Yushkevich (Steph) Information Security Auditor, Embedi Abstract

        Add to Reading List

        Source URL: ioactive.com

        Language: English - Date: 2018-08-17 20:57:56