Security Analysis

Results: 6956



#Item
591

2014 IEEE Security and Privacy Workshops Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits Frank L. Greitzer PsyberAnalytix

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2014-04-30 03:10:15
    592

    Events and Analysis: Global Currency Industry Innovative Approaches to the Selection of Banknote Security Features: counterfeit analysis We continue informing our readers about the results of the latest research

    Add to Reading List

    Source URL: www.dnb.nl

    Language: English - Date: 2015-02-27 04:31:21
      593

      2013 IEEE Security and Privacy Workshops Understanding Network Forensics Analysis in an Operational Environment Xenofontas Dimitropoulos ETH Zurich Communication Systems Group

      Add to Reading List

      Source URL: ieee-security.org

      Language: English - Date: 2013-05-05 16:04:58
        594

        Climate Security Effective Measures at Tackling Climate Change: An Analysis of the Divestment Movement Summary Sheet February 2015

        Add to Reading List

        Source URL: www.americansecurityproject.org

        Language: English - Date: 2015-02-10 17:32:36
          595

          GCE 1km Crop Dominance (aka GCE V0.0) + Overview This Global Food Security-support Analysis Data (GFSAD) Project’s Global Cropland Extent Product at nominal 1km (GCE 1Km Crop Dominance). The GCE 1KM Crop Dominance pro

          Add to Reading List

          Source URL: e4ftl01.cr.usgs.gov

          Language: English
            596

            Critical Analysis and Action Strategies Fatoumata Kéïta Building a Security Community from an African-Centered

            Add to Reading List

            Source URL: www.westafricainstitute.org

            Language: English - Date: 2015-04-14 09:31:09
              597

              Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking Ralf K¨usters University of Trier, Germany Tomasz Truderung University of Trier, Germany

              Add to Reading List

              Source URL: ieee-security.org

              Language: English - Date: 2014-04-21 13:48:10
                598

                Symantec™ Managed Security Services Security monitoring, correlation and analysis by GIAC certified experts Data Sheet: Symantec Cyber Security: Managed Services Overview Leverage Global Threat Intelligence

                Add to Reading List

                Source URL: www.symantec.com

                Language: English - Date: 2014-10-06 11:58:46
                  599

                  Frequently Asked Questions (FAQ) What are GCE 1km Crop Dominance (aka GCE V0.0) product and GCE 1km Multi-study Crop Mask (aka GCE V1.0) products? Global Food Security-support Analysis Data @ 30 m (GFSAD30) will be produ

                  Add to Reading List

                  Source URL: e4ftl01.cr.usgs.gov

                  Language: English
                    600

                    A Framework for Assessing and Improving the Security Posture of Industrial Control Systems (ICS) Systems and Network Analysis Center Released: August 20, 2010

                    Add to Reading List

                    Source URL: www.nsa.gov

                    Language: English - Date: 2011-01-07 08:40:12
                      UPDATE