Security analysis

Results: 6956



#Item
321Systematic review / Cyberwarfare / Computer network security / Qualitative research / Meta-analysis / Computer security / Bias / Exploratory research / Publication bias / Trustwave Holdings / Malware

COLUMNS Exploring with a Purpose D A N G E E R A N D J AY J A C O B S Dan Geer is the CISO for In-QTel and a security researcher with a quantitative bent. He has

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-20 09:35:48
322Risk / Actuarial science / Prevention / Safety / Risk analysis / Security / Probability / Financial risk / Operational risk / Enterprise risk management / Risk assessment

M AYc o r p o r a t e f i n a n c e

Add to Reading List

Source URL: www.iclifgovernance.org

Language: English - Date: 2013-07-23 00:07:28
323

An Analysis of Private Browsing Modes in Modern Browsers Gaurav Aggarwal Elie Burzstein Stanford University Abstract We study the security and privacy of private browsing

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:08
    324Computing / Cryptography / Secure communication / Security / Internet privacy / Crypto-anarchism / Mix network / Traffic analysis / Mixminion / Anonymous remailer / Denial-of-service attack / Len Sassaman

    Heartbeat Traffic to Counter (n-1) Attacks Red-Green-Black Mixes George Danezis Anonymizer, IncMission Center Road, PMB 426

    Add to Reading List

    Source URL: www0.cs.ucl.ac.uk

    Language: English - Date: 2013-10-10 06:48:57
    325United States Department of Defense / Military / United States federal executive departments / DARPA / Network-centric warfare / Office of the Secretary of Defense / Defense Information Systems Agency / Cyber Security and Information Systems Information Analysis Center / Operational Test and Evaluation Force

    UNCLASSIFIED Department of Defense Fiscal Year (FYBudget Estimates FebruaryRESEARCH, DEVELOPMENT, TEST AND EVALUATION, DEFENSE-WIDE

    Add to Reading List

    Source URL: www.darpa.mil

    Language: English - Date: 2015-04-24 13:56:03
    326Computer security / Security / Data security / IT risk management / Risk analysis / BeyondTrust / Vulnerability / Threat / IT risk / Risk management / Asset

    BeyondTrust Corporate Overview The leader in preventing data breaches from insider privilege abuse and external hacking attacks Reducing IT security risk with unmatched visibility and control The majority of data breache

    Add to Reading List

    Source URL: www.ciosummits.com

    Language: English - Date: 2016-02-10 11:33:29
    327Domain name system / Internet / Computing / Network architecture / Internet protocols / Internet Standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Name server / Root name server / Time to live

    Resolver Analysis for a Signed Root NLnet Labs documentversion 06. June 22, 2009 Abstract

    Add to Reading List

    Source URL: www.nlnetlabs.nl

    Language: English - Date: 2009-06-27 06:06:52
    328

    Security Analysis of Cryptographically Controlled Access to XML Documents Mart´ın Abadi Computer Science Department University of California at Santa Cruz

    Add to Reading List

    Source URL: www.cs.bris.ac.uk

    Language: English - Date: 2007-01-08 08:20:32
      329Computing / Computer network security / Multi-agent systems / Spamming / Concurrent computing / Cyberwarfare / Botnet / Distributed computing / Computer virus / Malware / Algorithmic trading / Antivirus software

      BOT-TREK CYBER INTELLIGENCE ci.group-ib.com GROUP-IB REPORT: ANALYSIS OF ATTACKS AGAINST TRADING AND BANK CARD

      Add to Reading List

      Source URL: www.group-ib.ru

      Language: English - Date: 2016-02-08 03:52:06
      330

      Quantitative Security Analysis for Programs with Low Input and Noisy Output Tri Minh Ngo and Marieke Huisman University of Twente, Netherlands

      Add to Reading List

      Source URL: wwwhome.ewi.utwente.nl

      Language: English - Date: 2013-12-05 10:06:04
        UPDATE