Security analysis

Results: 6956



#Item
291

Design and Analysis of Sectrace: A Protocol to Set up Security Associations and Policies in IPSec Networks∗ Alwyn Goodloe University of Pennsylvania

Add to Reading List

Source URL: seclab.illinois.edu

Language: English - Date: 2011-06-08 17:58:15
    292Cyberwarfare / Malware / Computer viruses / Computer security / Carding / Malware analysis

    Embracing the new threat: towards automatically, self-diversifying malware Mathias Payer <> UC Berkeley and (soon) Purdue University

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    293

    Hybrid monitoring of Attacker Knowledge F. Besson, N. Bielova, T. Jensen Dynamic Information Flow analysis Assign "high-low (H-L)" security labels to • values (track confidential information)

    Add to Reading List

    Source URL: ajacs.inria.fr

    Language: English - Date: 2015-11-26 11:02:33
      294Computing / Computer security / Security / Computer network security / Cyberinfrastructure / Information Sharing and Analysis Center / National Security Agency / Center for Internet Security / Cyberwarfare / International Multilateral Partnership Against Cyber Threats / ISAC / United States Department of Homeland Security

      The Multi-State Information Sharing and Analysis Center (MS-ISAC) is a voluntary and collaborative effort designated by The Department of Homeland Security as the key resource for cyber threat prevention, protection, res

      Add to Reading List

      Source URL: msisac.cisecurity.org

      Language: English - Date: 2016-05-19 15:01:24
      295Computer network security / Hacking / Software testing / Computer security / Vulnerability / Cross-site scripting / SQL injection / Program analysis / Web application security / Penetration test / Application security / Software bug

      Questions Developers Ask While Diagnosing Potential Security Vulnerabilities with Static Analysis Justin Smith, Brittany Johnson, and Emerson Murphy-Hill Bill Chu and Heather Richter Lipford

      Add to Reading List

      Source URL: www4.ncsu.edu

      Language: English - Date: 2015-07-31 17:48:16
      296Computer architecture / Computer security / System software / Trusted computing / Operating system kernels / Boot loaders / Cryptographic software / Trusted Platform Module / Trusted Execution Technology / Trusted Computing Group / Loadable kernel module / Loader

      Analysis of a Measured Launch

      Add to Reading List

      Source URL: evenmere.org

      Language: English - Date: 2008-06-23 13:59:25
      297

      Policy Briefing Series [PBEconomic impact of the recent decrease in social security contributions – A model based analysis – Philipp Engler, Simon Voigts, Robert Kirchner, Oleksandra Betliy

      Add to Reading List

      Source URL: www.beratergruppe-ukraine.de

      Language: English
        298Computer access control / Federated identity / Identity management / OpenID / OAuth / Security Assertion Markup Language / Authentication / Digital identity / Identity provider / WebID / Information Card / Shibboleth

        A Comparative Analysis of Identity Standards for the Internet Master Thesis Kaspar Etter

        Add to Reading List

        Source URL: www.digitalid.net

        Language: English - Date: 2014-05-23 10:03:12
        299

        Analysis of Multivariate Hash Functions Jean-Philippe Aumasson? and Willi Meier?? FHNW, 5210 Windisch, Switzerland Abstract. We analyse the security of new hash functions whose compression function is explicitly defined

        Add to Reading List

        Source URL: 131002.net

        Language: English - Date: 2012-08-14 06:46:46
          300Computer access control / Software engineering / Software requirements / Identity management / Computer security / EduGAIN / TERENA / Requirement / Authentication / GANT

            05-­10-­2015   Deliverable  DJRA1.1:   Analysis  of  user  community  and  service  

          Add to Reading List

          Source URL: aarc-project.eu

          Language: English - Date: 2015-10-07 16:41:13
          UPDATE