Security University

Results: 12075



#Item
991Software / Free software / Software bug / Bug tracking system / Bug / Debugging / Software testing / Linux kernel / Internet security

When Would This Bug Get Reported? Ferdian Thung1, David Lo1 , Lingxiao Jiang1 , Lucia1 , Foyzur Rahman2 , and Premkumar T. Devanbu2 1 Singapore Management University, Singapore 2 University of California, Davis, USA

Add to Reading List

Source URL: macbeth.cs.ucdavis.edu

Language: English - Date: 2012-11-07 15:16:26
992

CASE STUDY Michigan State University implements language security technology to address runtime threat gap In recent years, Michigan State University (MSU) set out to make information security a critical priority, invit

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2015-12-01 17:37:51
    993Security / Prevention / National security / Safety / Cybercrime / E-commerce / Cyberwarfare / Computer network security / Computer security / United States Cyber Command / Resilience / Cyber-attack

    SUPERSTORM SANDY: IMPLICATIONS FOR DESIGNING A POST‑CYBER ATTACK POWER RESTORATION SYSTEM Paul Stockton Copyright © 2016 The Johns Hopkins University Applied Physics Laboratory LLC. All Rights Reserved.

    Add to Reading List

    Source URL: www.jhuapl.edu

    Language: English - Date: 2016-03-29 09:30:55
    994

    Delegating Network Security with More Information Jad Naous Ryan Stutsman Stanford University

    Add to Reading List

    Source URL: rstutsman.github.io

    Language: English - Date: 2016-01-06 11:53:39
      995Internet privacy / Marketing / Privacy / World Wide Web / Computing / Internet advertising / Internet marketing / HTTP cookie / Hypertext Transfer Protocol / Online advertising / Do Not Track / Information privacy

      Variations in Tracking in Relation to Geographic Location Nathaniel Fruchter, Hsin Miao, Scott Stevenson Carnegie Mellon University {nhf,hsinm,sbsteven}@andrew.cmu.edu

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2015-05-11 00:01:37
      996Email / Simple Mail Transfer Protocol / Message transfer agent / Opportunistic TLS / Internet Message Access Protocol / Post Office Protocol / Extended SMTP / SMTP proxy / Email client

      Neither Snow Nor Rain Nor MITM... 
 Real World Email Delivery Security Zakir Durumeric University of Michigan

      Add to Reading List

      Source URL: zakird.com

      Language: English
      997

      Evaluating the Security of a DNS Query Obfuscation Scheme for Private Web Surfing? Dominik Herrmann, Max Maaß, and Hannes Federrath University of Hamburg, Computer Science Department, Germany Abstract. The Domain Name

      Add to Reading List

      Source URL: svs.informatik.uni-hamburg.de

      Language: English - Date: 2014-03-19 09:55:21
        998Champaign County /  Illinois / Illinois / Email / Mailto / Security / Computing / Background check / University of Illinois at UrbanaChampaign / Acceptance

        RTF Document

        Add to Reading List

        Source URL: www.ahr.illinois.edu

        Language: English - Date: 2015-12-22 13:44:43
        999

        Don’t Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy Jakub Czyz∗ , Matthew Luckie† , Mark Allman‡ , and Michael Bailey§ ∗ University of Michigan and QuadMetrics, Inc.; jczyz@

        Add to Reading List

        Source URL: web.engr.illinois.edu

        Language: English - Date: 2016-03-02 08:24:56
          1000

          Annual Security & Fire Safety Report October 1, 2015 Northwestern oklahoma state university 709 Oklahoma Boulevard, Alva, Oklahoma 73717

          Add to Reading List

          Source URL: www.nwosu.edu

          Language: English - Date: 2015-09-16 16:03:39
            UPDATE