Security analysis

Results: 6956



#Item
411

GPU assisted Mutual Information Analysis Attacks on AES Hans Christoph Hudde Bachelor Thesis Chair for Embedded Security - Prof. Dr.-Ing. Christof Paar

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-02-19 13:07:47
    412

    Analysis of Three Multilevel Security Architectures Timothy E. Levin Cynthia E. Irvine Naval Postgraduate School Naval Postgraduate School

    Add to Reading List

    Source URL: www.cisr.us

    Language: English - Date: 2007-11-15 12:21:16
      413

      Private Sector Cyber Security Investment Strategies: An Empirical Analysis* Brent R. Rowe Technology Economics and Policy RTI International

      Add to Reading List

      Source URL: www.econinfosec.org

      Language: English - Date: 2006-07-20 16:57:22
        414

        13TH INTERNATIONAL SCHOOL ON FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN FOSAD 2013 http://www.sti.uniurb.it/events/fosad13 2–7 September 2013, Bertinoro, Italy

        Add to Reading List

        Source URL: www.sti.uniurb.it

        Language: English - Date: 2013-06-13 10:35:53
          415

          2011 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing An Analysis of Anonymity in the Bitcoin System Fergal Reid Martin Harrigan

          Add to Reading List

          Source URL: users.encs.concordia.ca

          Language: English - Date: 2013-08-05 10:54:45
            416Internet security / Internet Standards / Internet protocols / Secure communication / Dark web / IP hijacking / Tor / Border Gateway Protocol / Traffic analysis / Denial-of-service attack / Transmission Control Protocol

            RAPTOR: Routing Attacks on Privacy in Tor arXiv:1503.03940v1 [cs.NI] 13 Mar 2015 Yixin Sun Princeton University

            Add to Reading List

            Source URL: vanbever.eu

            Language: English - Date: 2015-03-17 04:19:13
            417

            Can They Hear Me Now? A Security Analysis of Law Enforcement Wiretaps Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark, and Matt Blaze Dept. of Computer and Information Science, University of Pennsylvania Philadelphia,

            Add to Reading List

            Source URL: security.cs.georgetown.edu

            Language: English - Date: 2010-07-16 14:58:20
              418

              Let the Pirates Patch? An Economic Analysis of Network Software Security Patch Restrictions Terrence August and Tunay I. Tunca Graduate School of Business, Stanford University Stanford, CA, 94305

              Add to Reading List

              Source URL: digital.mit.edu

              Language: English - Date: 2006-09-09 12:13:56
                419Computing / Software / System software / Computer systems / Network management / Log analysis / Login / Windows Security Log / Logfile / Event Viewer / Password / Windows

                Authored by Anton Chuvakin (chuvakin.org) and Lenny Zeltser (zeltser.com). Reviewed by Anand Sastry. Distributed according to the Creative Commons v3 “Attribution” License. Cheat sheet version 1.0. Critical Log Revie

                Add to Reading List

                Source URL: www.securitywarriorconsulting.com

                Language: English - Date: 2010-03-23 02:06:50
                UPDATE