Michael Goldsmith

Results: 25



#Item
1

Recent Developments in FDR? Philip Armstrong, Michael Goldsmith, Gavin Lowe, Jo¨el Ouaknine, Hristina Palikareva, A. W. Roscoe, and James Worrell Department of Computer Science, Oxford University, UK {phila,michael,gavi

Add to Reading List

Source URL: www.cs.ox.ac.uk

- Date: 2012-07-26 22:40:05
    2

    Article pubs.acs.org/cm Theoretical Limits of Hydrogen Storage in Metal−Organic Frameworks: Opportunities and Trade-Offs Jacob Goldsmith,† Antek G. Wong-Foy,‡ Michael J. Cafarella,§ and Donald J. Siegel*,†,⊥

    Add to Reading List

    Source URL: web.eecs.umich.edu

    Language: English - Date: 2013-08-14 13:50:33
      3Computer crimes / Cyberwarfare / Melissa Hathaway / Internet-related prefixes / Cyberspace / War / Military science / Crime / Electronic warfare / Hacking / Military technology

      Understanding the Dynamics of Cyber International Relations Project Team Nazli Choucri (PI), David D. Clark, Roger Hurwitz, Daniel Goldsmith, Stuart Madnick, John C. Mallery, Silvio Micali, Michael Siegel, Patrick H. Win

      Add to Reading List

      Source URL: web.mit.edu

      Language: English - Date: 2010-10-07 14:21:20
      4Frances Hesselbein / Peter Drucker / United States / Nationality / Marshall Goldsmith / Rotman School of Management / Rotman

      Michael Lee Stallard Primary Author of Fired Up Or Burned Out Co-Founder and President E Pluribus Partners

      Add to Reading List

      Source URL: epluribuspartners.com

      Language: English - Date: 2012-07-18 04:43:49
      5

      2014 IEEE Security and Privacy Workshops Understanding Insider Threat: A Framework for Characterising Attacks Jason R.C. Nurse† , Oliver Buckley† , Philip A. Legg† , Michael Goldsmith† , Sadie Creese† , Gordon

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2014-04-30 03:10:27
        6Hacking / Software testing / Threat / Abuse / Vulnerability / Attack tree / Insider / Motivation / Computer network security / Cyberwarfare / Computer security

        2014 IEEE Security and Privacy Workshops Understanding Insider Threat: A Framework for Characterising Attacks Jason R.C. Nurse† , Oliver Buckley† , Philip A. Legg† , Michael Goldsmith† , Sadie Creese† , Gordon

        Add to Reading List

        Source URL: ieee-security.org

        Language: English - Date: 2014-04-30 03:10:27
        7Peptide hormones / Neuropeptides / Leptin / Nutrition / Adipose tissue / Adiponectin / Central melanocortin system / Hypothalamus / Anorexia nervosa / Biology / Anatomy / Obesity

        Research article Low-dose leptin reverses skeletal muscle, autonomic, and neuroendocrine adaptations to maintenance of reduced weight Michael Rosenbaum, Rochelle Goldsmith, Daniel Bloomfield, Anthony Magnano, Louis Weim

        Add to Reading List

        Source URL: www.ncbi.nlm.nih.gov

        Language: English
        8Hacking / Software testing / Threat / Abuse / Vulnerability / Attack tree / Insider / Motivation / Computer network security / Cyberwarfare / Computer security

        2014 IEEE Security and Privacy Workshops Understanding Insider Threat: A Framework for Characterising Attacks Jason R.C. Nurse† , Oliver Buckley† , Philip A. Legg† , Michael Goldsmith† , Sadie Creese† , Gordon

        Add to Reading List

        Source URL: www.cs.ox.ac.uk

        Language: English - Date: 2015-03-18 10:54:32
        9Cyberwarfare / Data security / Crime prevention / National security / Information security / Vulnerability / Threat / Security controls / Network security / Security / Computer security / Computer network security

        Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat Oliver Buckley, Jason R. C. Nurse, Philip A. Legg, Michael Goldsmith, Sadie Creese Cyber Security Centre, Department of Compute

        Add to Reading List

        Source URL: www.cs.ox.ac.uk

        Language: English - Date: 2015-03-18 10:54:09
        10Security / P3P / Information privacy / Internet privacy / Health Insurance Portability and Accountability Act / Information security / XACML / Policy / Personally identifiable information / Privacy / Ethics / Computing

        Towards A Conceptual Model For Privacy Policies Marco Casassa Mont, Siani Pearson, Sadie Creese, Michael Goldsmith, Nick Papanikolaou HP Laboratories HPL[removed]Keyword(s): privacy policies, policy hierarchy, policy ref

        Add to Reading List

        Source URL: shiftleft.com

        Language: English - Date: 2010-07-21 19:05:14
        UPDATE