Network security

Results: 23614



#Item
561Security / Computing / Prevention / Computer network security / Crime prevention / Cryptography / Information governance / National security / Capture the flag / Information security / Vulnerability / Computer security

Experiences In Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise ∗ Joseph Werther, Michael Zhivich, Tim Leek MIT Lincoln Laboratory POC:

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-07-08 13:42:25
562Software / Computing / Cyberwarfare / Computer network security / Internet Standards / Multi-agent systems / Spamming / Transmission Control Protocol / Skype / Botnet / Transport Layer Security / Network packet

Two Methods for Detecting Malware Maciej Korczyński, Gilles Berger-Sabbatel, and Andrzej Duda Grenoble Institute of Technology, CNRS Grenoble Informatics Laboratory UMR, rue de la Passerelle, BPSaint

Add to Reading List

Source URL: mkorczynski.com

Language: English - Date: 2015-02-15 17:10:50
563Computer security / Security / Prevention / Computer access control / Cryptography / Computer network security / Cybercrime / Identity management / Password / Authentication / One-time password / Salt

TwoKind Authentication: Usable Authenticators for Untrustworthy Environments Katelin Bailey Linden Vongsathorn

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-22 15:47:38
564Computing / Network architecture / Internet protocols / Secure communication / World Wide Web / Computer networking / Transport Layer Security / QUIC / Proxy server / SPDY / HTTPS / Hypertext Transfer Protocol

The Cost of the “S” in HTTPS David Naylor? , Alessandro Finamore† , Ilias Leontiadis‡ , Yan Grunenberger‡ , Marco Mellia† , Maurizio Munafò† , Konstantina Papagiannaki‡ , and Peter Steenkiste? ? Carnegi

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 16:56:14
565Economy / Money / Business / Payment systems / E-commerce / Merchant services / Identity theft / Computer network security / Credit card fraud / Fraud / Computer security / Credit card

Rudolf: Interactive Rule Refinement System for Fraud Detection Tova Milo 1 Slava Novgorodov 1 1

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2016-08-04 06:51:27
566Computing / Computer architecture / Security engineering / Computer network security / Dynamic Host Configuration Protocol / Network service / Windows / Computer security

SECURITY COMPLIANCE MANAGEMENT THE ELEMENTAL COMPLIANCE SYSTEM Managing security in ever-changing enterprise networks requires that compliance officers and IT security managers continuously measure how well networked co

Add to Reading List

Source URL: www.nsaservices.com

Language: English - Date: 2013-03-28 15:31:27
567Security / Crime prevention / Cyberwarfare / Computer network security / Computer security / Cryptography / National security / National Health Service

Security Policy Category Summary

Add to Reading List

Source URL: www.bapam.org.uk

Language: English - Date: 2016-04-07 10:06:24
568Computing / Network architecture / Internet / Network performance / Cryptographic protocols / Secure communication / Internet protocols / Flow control / Transmission Control Protocol / Transport Layer Security / TCP congestion control / HTTPS

HEIST: HTTP Encrypted Information can be Stolen through TCP-windows Mathy Vanhoef and Tom Van Goethem iMinds-DistriNet -

Add to Reading List

Source URL: tom.vg

Language: English - Date: 2016-08-03 21:35:58
569Software / Computing / Security / Cybercrime / Cyberwarfare / First Amendment to the United States Constitution / Computer network security / Computer security / Cryptography / Internet censorship / Facebook / Freedom of speech in the United States

Microsoft WordMedia Institute Luncheon Remarks - APPROVED.docx

Add to Reading List

Source URL: www.mediainstitute.org

Language: English - Date: 2016-04-13 15:41:25
570Computing / Technology / Media technology / Information technology management / Humancomputer interaction / Computer network / Social computing / Application software / Cloud computing / Autonomic networking / Internet / Computer security

`` Innovation, Advice and Guidance Innovation advice and guidance from experts, providing businesses with expert knowledge and highly specialised and technical skills to innovate and improve performance.

Add to Reading List

Source URL: www.infolab21.lancs.ac.uk

Language: English - Date: 2011-06-03 08:49:59
UPDATE