Security analysis

Results: 6956



#Item
201Law enforcement / Government / United States intelligence agencies / National security / Military intelligence / Crime prevention / Intelligence-led policing / Intelligence sharing / Information Sharing Environment / Central Intelligence Agency / Intelligence analysis / Secretariat of Intelligence

Minimum Criminal Intelligence Training Standards for Law Enforcement and Other Criminal Justice Agencies in the United States Findings and Recommendations

Add to Reading List

Source URL: www.ncirc.gov

Language: English - Date: 2009-07-02 11:39:46
202Information privacy / Privacy / General Data Protection Regulation / European Union directives / Information / Data security / Data protection / European Digital Rights / European Union law / Data Protection Directive / Personally identifiable information / DPA

1 EDRi analysis on the most dangerous flexibilities allowed by the General Data Protection Regulation (*) General Note on divergences: One of the main reasons for adopting the main Data Protection Directive (DPD) in 19

Add to Reading List

Source URL: edri.org

Language: English - Date: 2016-07-11 06:14:36
203Game theory / Search game / Hide-and-seek / Extensive-form game / Strategy / Random walk / Mathematics / Mathematical analysis

Playing Hide-and-Seek: An Abstract Game for Cyber Security Martin Chapman Gareth Tyson

Add to Reading List

Source URL: www.eecs.qmul.ac.uk

Language: English - Date: 2015-04-27 11:46:30
204Computing / Software / Application software / Scientific method / Salvatore J. Stolfo / User / Milgram experiment / Statistics / ROOT / Internet privacy / Data analysis / Windows Vista

On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned Malek Ben Salem and Salvatore J. Stolfo Computer Science Department Columbia University

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-07-08 13:42:25
205Microcontrollers / Disk encryption / Instruction set architectures / Cryptographic software / Non-volatile memory / PIC microcontroller / USB flash drive / Serial Peripheral Interface Bus / In-system programming / Flash memory / Firmware / Encryption

Analysis of an encrypted HDD J. Czarny, R. Rigo May 11, 2015 Abstract The idea of this presentation is to debunk the myth that analyzing the security of hardware is difficult. From the perspective of a software reverse e

Add to Reading List

Source URL: www.sstic.org

Language: English - Date: 2015-05-26 11:04:26
206Face recognition / Face perception / Facial recognition system / FERET / Linear discriminant analysis / Face / Procrustes analysis / Eyebrow / Eigenface / Face hallucination

To appear: IEEE Transactions on Information Forensics and Security Component-Based Representation in Automated Face Recognition Kathryn Bonnen, Brendan Klare, Student Member, IEEE and Anil Jain, Fellow, IEEE

Add to Reading List

Source URL: openbiometrics.org

Language: English - Date: 2016-08-02 16:53:35
207Famines / Food politics / Development studies / Malnutrition / Aftermath of war / Famine Early Warning Systems Network / Food security / Famine / 200708 world food price crisis / Drought / El Nio / Burkina Faso

Global analysis of food and nutrition security situation in food crisis hotspots March 2016

Add to Reading List

Source URL: publications.jrc.ec.europa.eu

Language: English - Date: 2016-04-27 20:29:28
208Risk / Vulnerability / Security / Actuarial science / Hazard analysis / Social vulnerability / Hazard / Vulnerability assessment / Disaster / HAZUS / Reliability engineering

Environmental Modelling & Software156e169 Contents lists available at ScienceDirect Environmental Modelling & Software journal homepage: www.elsevier.com/locate/envsoft

Add to Reading List

Source URL: homepage.univie.ac.at

Language: English - Date: 2015-06-01 23:03:25
209Social programs / Employment compensation / Welfare economics / Social systems / Welfare state / Flexicurity / Labour market flexibility / Parental leave / Unemployment benefits / Social security in Australia / Working time / Unemployment

Microsoft Word - MISSOC Analysis _Final_EN

Add to Reading List

Source URL: www.missoc.org

Language: English - Date: 2016-04-18 12:30:29
210Stock market / Banking / T2S / Real-time gross settlement / Postmodern theory / Sociolinguistics / TARGET2 / Discourse analysis / Settlement / European Central Bank / Security / Market

Nomaxpo discussion paper Economic Discourse and the European Integration of

Add to Reading List

Source URL: www.maxpo.eu

Language: English - Date: 2016-08-03 11:57:28
UPDATE