Network security

Results: 23614



#Item
371Statistics / Statistical classification / Data / Anomaly detection / Data mining / Data security / Machine learning / Support vector machine / Outlier / Decision boundary / Artificial neural network

Enhancing One-class Support Vector Machines for Unsupervised Anomaly Detection Mennatallah Amer1, Markus Goldstein2, Slim Abdennadher1 1 2

Add to Reading List

Source URL: www.outlier-analytics.org

Language: English - Date: 2013-08-13 15:59:38
372Computing / Cyberwarfare / Computer security / Computer network security / Cross-site scripting / Hacking / Cross-site request forgery / JavaScript / SQL injection / Application security / Web application firewall

PREVOTY APPLICATION SECURITY MONITOR AND PROTECT YOUR APPLICATIONS AT RUNTIME For hackers, the money is in applications and the databases they access. For enterprises, the distributed, dynamic nature of applications and

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2016-08-18 22:09:36
373Computing / Computer security / Computer networking / Trusted computing / Computer network security / Cyberwarfare / Data security / Firewall / Trusted Execution Technology / Network address translation / Trusted Platform Module / Packet processing

ETTM: A Scalable Fault Tolerant Network Manager Colin Dixon Hardeep Uppal Vjekoslav Brajkovic Dane Brandon Thomas Anderson Arvind Krishnamurthy University of Washington Abstract In this paper, we design, implement, and e

Add to Reading List

Source URL: colindixon.com

Language: English - Date: 2012-04-28 16:29:27
374Digital rights management / Malware / Computer security / Internet advertising / Computer network security / Identity theft / Rogue software / Spyware / Internet privacy / Origin / Web browser / Application software

Downloadable Software Guidelines Funmoods is committed to ethical standards for downloadable Downloadable Software Application ("Downloadable Software Application") and follows these guidelines: • No Downloadable Soft

Add to Reading List

Source URL: www.funmoods.com

Language: English - Date: 2013-01-24 10:11:01
375Computer security / Cyberwarfare / Security / Cybercrime / Computer network security / E-commerce / Antivirus software / Secure communication / Phishing / Malware / Computer worm / Trusteer

the importance of layered security_fin-01

Add to Reading List

Source URL: nl.malwarebytes.com

Language: English - Date: 2016-07-07 13:03:55
376Security / Prevention / National security / Spyware / Cybercrime / Computer security / Cyberwarfare / Cyberspace / Citizen Lab / Cyber spying / GhostNet / Computer and network surveillance

Ronald J. Deibert, Black Code: Inside the Battle for Cyberspace

Add to Reading List

Source URL: blackcodebook.com

Language: English - Date: 2013-12-05 09:48:11
377Computer architecture / Computing / Computer network security / OS X / Wireless networking / IEEE 802.11 / Wi-Fi / Mac OS X Lion / AirPort / Wi-Fi Protected Access / IEEE 802.1X / Mac OS X Leopard

      Network  Administration  

Add to Reading List

Source URL: it.team.uhsystem.com

Language: English - Date: 2014-02-11 09:45:58
378Epidemiology / Physics / Medicine / Vaccination / Cyberwarfare / Computer network security / Computer security / Threat / Faster-than-light / Infection / Influenza / Malware

Internet wormholes Can security patches travel faster than light? A reliable strategy for controlling the propagation of malicious software has become and will likely remain the Holy Grail of network security in the fore

Add to Reading List

Source URL: www.monmeetings.org

Language: English - Date: 2015-09-04 10:25:02
379Computing / Computer network security / Cloud infrastructure / Cloud computing / Computer security / Computer networking / Serena Software / Software as a service / ITIL / Multitenancy / Application security / Security service

SERENA SOFTWARE Serena Service Manager Security in the Cloud Author: Amitav Chakravartty

Add to Reading List

Source URL: www.serena.com

Language: English - Date: 2013-01-10 16:22:05
380Wireless networking / Wireless / Computing / Mobile technology / Certified Wireless Network Administrator / IEEE 802.11 / Wi-Fi / Certified Wireless Security Professional / Wireless LAN / Certified Wireless Network Expert / CompTIA / Professional certification

CWNT™ - Certified Wireless Network Trainer™ Application

Add to Reading List

Source URL: www.cwnp.com

Language: English - Date: 2015-12-08 13:58:12
UPDATE