Network security

Results: 23614



#Item
51The Bro Network Security Monitor  Network Forensics with Bro Matthias Vallentin UC Berkeley / ICSI

The Bro Network Security Monitor Network Forensics with Bro Matthias Vallentin UC Berkeley / ICSI

Add to Reading List

Source URL: matthias.vallentin.net

Language: English - Date: 2018-02-10 06:49:34
52International Journal of Network Security, Vol.18, No.2, PP, MarA Measurement Study of the Content Security Policy on Real-World Applications

International Journal of Network Security, Vol.18, No.2, PP, MarA Measurement Study of the Content Security Policy on Real-World Applications

Add to Reading List

Source URL: ijns.jalaxy.com.tw

Language: English - Date: 2015-07-29 04:41:28
    53International Journal of Security and Its Applications Vol.8, No), pphttp://dx.doi.orgijsiaHow to Formally Model Features of Network Security Protocols∗

    International Journal of Security and Its Applications Vol.8, No), pphttp://dx.doi.orgijsiaHow to Formally Model Features of Network Security Protocols∗

    Add to Reading List

    Source URL: formal.hknu.ac.kr

    Language: English - Date: 2018-03-08 05:11:17
      54CS461/ECE422 Computer Security I March 9, 2015 Project 3: Network Security

      CS461/ECE422 Computer Security I March 9, 2015 Project 3: Network Security

      Add to Reading List

      Source URL: courses.engr.illinois.edu

      Language: English - Date: 2015-04-20 13:04:03
        55ISSN 1816-353X (Print) ISSNOnline) Vol. 17, No. 2 (Mar. 2015)  INTERNATIONAL JOURNAL OF NETWORK SECURITY

        ISSN 1816-353X (Print) ISSNOnline) Vol. 17, No. 2 (Mar. 2015) INTERNATIONAL JOURNAL OF NETWORK SECURITY

        Add to Reading List

        Source URL: ijns.jalaxy.com.tw

        Language: English - Date: 2015-07-14 03:08:33
          56SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks Not Every Permissionless Payment Network Requires a Blockchain Giulio Malavolta∗

          SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks Not Every Permissionless Payment Network Requires a Blockchain Giulio Malavolta∗

          Add to Reading List

          Source URL: crypsys.mmci.uni-saarland.de

          Language: English - Date: 2017-01-12 16:00:02
            57National Cyber Security Strategies – ENISA supporting the EU Dr. Evangelos Ouzounis, Head of Critical Infrastructures and Services Unit, ENISA European Union Agency for Network and Information Security

            National Cyber Security Strategies – ENISA supporting the EU Dr. Evangelos Ouzounis, Head of Critical Infrastructures and Services Unit, ENISA European Union Agency for Network and Information Security

            Add to Reading List

            Source URL: resilience.enisa.europa.eu

            Language: English - Date: 2015-05-18 04:53:59
              58IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING  1 Improving Security and Performance in the Tor Network through Tunable Path Selection

              IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 1 Improving Security and Performance in the Tor Network through Tunable Path Selection

              Add to Reading List

              Source URL: hatswitch.org

              Language: English - Date: 2017-10-15 12:27:27
                59Exercise 1 Datalog and Network Reliability Program Analysis for System Security and Reliability 2018 ETH Zurich February 27, 2018

                Exercise 1 Datalog and Network Reliability Program Analysis for System Security and Reliability 2018 ETH Zurich February 27, 2018

                Add to Reading List

                Source URL: www.sri.inf.ethz.ch

                Language: English - Date: 2018-05-15 09:28:46
                  60Forum Guideline  NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authori

                  Forum Guideline NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authori

                  Add to Reading List

                  Source URL: cabforum.org

                  Language: English - Date: 2018-04-05 00:55:03