Security analysis

Results: 6956



#Item
41

SMART, SECURE NETWORKS OF CONNECTED PEOPLE SECURE INFORMATION SHARING Cyber-security information sharing platform designed for secure cross-organisational collaboration and collaborative intelligence analysis.

Add to Reading List

Source URL: www.surevine.com

Language: English - Date: 2016-11-15 11:52:23
    42

    Webroot SecureAnywhere Business Endpoint Protection Versus Sophos Endpoint Security and Control Comparative Analysis 2016 January Table of Contents 1

    Add to Reading List

    Source URL: www.mrg-effitas.com

    Language: English
      43

      Information Flow Analysis for Valued-Indexed Data Security Compartments Luísa Lourenço and Luís Caires CITI e Departamento de Informática Faculdade de Ciências e Tecnologia Universidade Nova de Lisboa, Portugal

      Add to Reading List

      Source URL: ctp.di.fct.unl.pt

      Language: English - Date: 2014-10-11 13:32:58
        44

        Security and Privacy Qualities of Medical Devices: An Analysis of FDA Postmarket Surveillance Daniel B. Kramer1*, Matthew Baker1, Benjamin Ransford2, Andres Molina-Markham2, Quinn Stewart2, Kevin Fu2, Matthew R. Reynolds

        Add to Reading List

        Source URL: sharps.org

        Language: English - Date: 2012-07-31 14:40:04
          45

          Webroot SecureAnywhere Business Endpoint Protection Versus McAfee Endpoint Security Comparative Analysis 2016 January Table of Contents 1

          Add to Reading List

          Source URL: www.mrg-effitas.com

          Language: English - Date: 2016-02-29 11:10:46
            46

            Exercise 4 Smart Contracts Program Analysis for System Security and Reliability 2018 ETH Zurich March 24, 2018

            Add to Reading List

            Source URL: www.sri.inf.ethz.ch

            Language: English - Date: 2018-05-15 09:28:46
              47

              Solution 5 Smart Contracts Program Analysis for System Security and Reliability 2018 ETH Zurich April 25, 2018

              Add to Reading List

              Source URL: www.sri.inf.ethz.ch

              Language: English - Date: 2018-05-15 09:28:46
                48

                A Large Scale Analysis of the Security of Embedded Firmwares A. Costin, J. Zaddach, A. Francillon, D. Balzarotti EURECOM, France 20th August 2014

                Add to Reading List

                Source URL: www.s3.eurecom.fr

                Language: English - Date: 2018-08-15 14:28:50
                  49

                  VMR AY ANALY ZER For Total Visibility and Defense Against Evasive Malware In the battle against malware, behavior-based analysis is one of the keys for security teams to detect and mitigate advanced threats. In

                  Add to Reading List

                  Source URL: www.vmray.com

                  Language: English - Date: 2018-06-09 05:35:20
                    50

                    Security Analysis of Cache Replacement Policies Pablo Ca˜ nones1 , Boris K¨opf1 , and Jan Reineke2 1 IMDEA Software Institute, Madrid, Spain

                    Add to Reading List

                    Source URL: software.imdea.org

                    Language: English - Date: 2017-01-24 06:16:37
                      UPDATE