Network security

Results: 23614



#Item
11Control-data plane intelligence trade-off in SDN Yash Sinha, Siddharth Bhatia Birla Institute of Technology and Science, Pilani, India  Abstract— With the decoupling of network control and data

Control-data plane intelligence trade-off in SDN Yash Sinha, Siddharth Bhatia Birla Institute of Technology and Science, Pilani, India Abstract— With the decoupling of network control and data

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 21:01:36
12Practical Template-Algebraic Side Channel Attacks with Extremely Low Data Complexity Yossef Oren, Ofir Weisse and Avishai Wool Cryptography and Network Security Lab School of Electrical Engineering Tel-Aviv University, R

Practical Template-Algebraic Side Channel Attacks with Extremely Low Data Complexity Yossef Oren, Ofir Weisse and Avishai Wool Cryptography and Network Security Lab School of Electrical Engineering Tel-Aviv University, R

Add to Reading List

Source URL: www.ofirweisse.com

Language: English - Date: 2018-10-17 09:19:20
13SoK: Exploiting Network Printers Jens Müller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk Horst Görtz Institute for IT-Security, Ruhr University Bochum , , juraj.so

SoK: Exploiting Network Printers Jens Müller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk Horst Görtz Institute for IT-Security, Ruhr University Bochum , , juraj.so

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:58
    14CoreFlow: Enriching Bro security events using network traffic monitoring data Ralph Koninga,b,∗, Nick Buragliob , Cees de Laata,b , Paola Grossoa a Universiteit b Energy  van Amsterdam, Science Park 904, Amsterdam, The

    CoreFlow: Enriching Bro security events using network traffic monitoring data Ralph Koninga,b,∗, Nick Buragliob , Cees de Laata,b , Paola Grossoa a Universiteit b Energy van Amsterdam, Science Park 904, Amsterdam, The

    Add to Reading List

    Source URL: delaat.net

    Language: English - Date: 2018-07-19 17:56:33
      15Privacy-Preserving Network Provenance Yuankai Zhang Adam O’Neill  Georgetown University

      Privacy-Preserving Network Provenance Yuankai Zhang Adam O’Neill Georgetown University

      Add to Reading List

      Source URL: security.cs.georgetown.edu

      Language: English - Date: 2017-09-01 10:50:49
        16AFRICAN FOOD SECURITY URBAN NETWORK (AFSUN)  THE SUPERMARKET REVOLUTION AND FOOD SECURITY IN NAMIBIA  URBAN FOOD SECURITY SERIES NO. 26

        AFRICAN FOOD SECURITY URBAN NETWORK (AFSUN) THE SUPERMARKET REVOLUTION AND FOOD SECURITY IN NAMIBIA URBAN FOOD SECURITY SERIES NO. 26

        Add to Reading List

        Source URL: www.osf.org.za

        Language: English - Date: 2018-06-08 04:40:39
          17Network Resiliency and Security Playbook Prepared for The National Institute for Hometown Security November, 2017  Network Resiliency and Security Playbook | November 2017

          Network Resiliency and Security Playbook Prepared for The National Institute for Hometown Security November, 2017 Network Resiliency and Security Playbook | November 2017

          Add to Reading List

          Source URL: www.ctcnet.us

          Language: English - Date: 2018-04-09 16:11:51
            18Prevent your Company From Becoming the Next Security Breach Victim The Traditional Security Perimeter is Gone Sensitive data resides on mobile devices, cloud services, and other locations outside your network. Authorized

            Prevent your Company From Becoming the Next Security Breach Victim The Traditional Security Perimeter is Gone Sensitive data resides on mobile devices, cloud services, and other locations outside your network. Authorized

            Add to Reading List

            Source URL: goverifyid.com

            Language: English - Date: 2017-03-13 13:20:54
              19Proceedings of the Internet Society Network and Distributed System Security Symposium (NDSS 2001), February 2001, ppEfficient and Secure Source Authentication for Multicast Adrian Perrig  

              Proceedings of the Internet Society Network and Distributed System Security Symposium (NDSS 2001), February 2001, ppEfficient and Secure Source Authentication for Multicast Adrian Perrig 

              Add to Reading List

              Source URL: people.csail.mit.edu

              Language: English - Date: 2008-10-12 11:59:02
                20Network instruction Wireless network is prepared at the multi-purpose hall. Settings are as follows: SSID: emis2012 Password: emis2012matsue Supported wireless and security protocols are 802.11a/b/g with WEP(128bit),

                Network instruction Wireless network is prepared at the multi-purpose hall. Settings are as follows: SSID: emis2012 Password: emis2012matsue Supported wireless and security protocols are 802.11a/b/g with WEP(128bit),

                Add to Reading List

                Source URL: ribf.riken.go.jp

                - Date: 2012-12-01 22:57:34