Network security

Results: 23614



#Item
21Dr. Joe Adams Merit Network Vice President of Research and Cyber Security  Merit Network

Dr. Joe Adams Merit Network Vice President of Research and Cyber Security Merit Network

Add to Reading List

Source URL: csoconference.com

Language: English - Date: 2018-03-03 18:03:10
    22zPRRecent cyber-attacks are often equipped with various sophisticated functions to evade security components protecting the network, and hence, it would be very difficult to identify the intrusions that employed s

    zPRRecent cyber-attacks are often equipped with various sophisticated functions to evade security components protecting the network, and hence, it would be very difficult to identify the intrusions that employed s

    Add to Reading List

    Source URL: www.zentillion.net

    Language: English - Date: 2017-02-03 11:34:53
      23Ghost in the Air(Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices Andrei Costin, Aur´elien Francillon Network and Security Department EURECOM Sophia-Antipolis, France

      Ghost in the Air(Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices Andrei Costin, Aur´elien Francillon Network and Security Department EURECOM Sophia-Antipolis, France

      Add to Reading List

      Source URL: www.s3.eurecom.fr

      Language: English - Date: 2018-08-15 14:28:51
        24Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ron Rivest Handout 6 April 22, 2014

        Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ron Rivest Handout 6 April 22, 2014

        Add to Reading List

        Source URL: courses.csail.mit.edu

        Language: English
          25Prevent your Company From Becoming the Next Security Breach Victim The Traditional Security Perimeter is Gone Sensitive data resides on mobile devices, cloud services, and other locations outside your network. Authorized

          Prevent your Company From Becoming the Next Security Breach Victim The Traditional Security Perimeter is Gone Sensitive data resides on mobile devices, cloud services, and other locations outside your network. Authorized

          Add to Reading List

          Source URL: www.iwsinc.com

          Language: English - Date: 2016-11-14 11:05:48
            26The Bro Network Security Monitor  Network Forensics with Bro Matthias Vallentin UC Berkeley / ICSI

            The Bro Network Security Monitor Network Forensics with Bro Matthias Vallentin UC Berkeley / ICSI

            Add to Reading List

            Source URL: www.bro.org

            Language: English - Date: 2018-06-21 17:27:25
              27Corsa Technology Network Security Red Armor NSE7000 Series of Control Points  •

              Corsa Technology Network Security Red Armor NSE7000 Series of Control Points •

              Add to Reading List

              Source URL: www.corsa.com

              Language: English - Date: 2018-06-04 18:03:25
                28CoreFlow: Enriching Bro security events using network traffic monitoring data Ralph Koninga,b,∗, Nick Buragliob , Cees de Laata,b , Paola Grossoa a Universiteit b Energy  van Amsterdam, Science Park 904, Amsterdam, The

                CoreFlow: Enriching Bro security events using network traffic monitoring data Ralph Koninga,b,∗, Nick Buragliob , Cees de Laata,b , Paola Grossoa a Universiteit b Energy van Amsterdam, Science Park 904, Amsterdam, The

                Add to Reading List

                Source URL: delaat.net

                Language: English - Date: 2018-07-19 17:57:25
                  29Same-Origin Policy: Evaluation in Modern Browsers Jörg Schwenk, Marcus Niemietz, and Christian Mainka Horst Görtz Institute for IT Security, Chair for Network and Data Security Ruhr-University Bochum  Abstract

                  Same-Origin Policy: Evaluation in Modern Browsers Jörg Schwenk, Marcus Niemietz, and Christian Mainka Horst Görtz Institute for IT Security, Chair for Network and Data Security Ruhr-University Bochum Abstract

                  Add to Reading List

                  Source URL: www.nds.rub.de

                  Language: English - Date: 2017-07-13 05:46:45
                    30Microsoft Word - CABForum_Network_Security_Controls.doc

                    Microsoft Word - CABForum_Network_Security_Controls.doc

                    Add to Reading List

                    Source URL: cabforum.org

                    Language: English - Date: 2013-10-14 12:19:16