Security analysis

Results: 6956



#Item
511Law / Privacy / Security / Fingerprints / Federal Bureau of Investigation / Prüm / Visa Information System / Schengen Information System / Combined DNA Index System / European Union law / Biometrics / Surveillance

Analysis  “Complex, technologically fraught and expensive” ‐ the problematic  implementation of the Prüm Decision  Chris Jones    The  implementation  of  the  Prüm  Treaty  has  been  be

Add to Reading List

Source URL: www.statewatch.org

Language: English - Date: 2012-09-06 12:39:25
512Security / Software / Industrial automation / SCADA / Telemetry / Computer security / Server / Computer emergency response team / Antivirus software / Technology / Computer network security

Cybersecurity on SCADA: risk prediction, analysis and reaction tools for Critical Infrastructures Service and tool developed and operated by : AVCaesar

Add to Reading List

Source URL: www.cockpitci.eu

Language: English - Date: 2014-03-28 18:11:02
513

Poster: R-D ROID: In-depth Application Vetting for Android with Path-sensitive Value Analysis Michael Backes∗ , Sven Bugiel† , Erik Derr† , Sebastian Gerling† and Christian Hammer† ∗ CISPA,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:18
    514Government bonds / Bonds / Fixed income analysis / Finance / Financial markets / Municipal bond / Corporate bond / United States Treasury security / Yield to maturity / Financial economics / Investment / Economics

    Understanding the Bond Market As markets become volatile, many investors turn to bonds as an alternative to stocks. While bonds can play an integral role in a well-diversified portfolio, investors should fully understand

    Add to Reading List

    Source URL: www.stifel.com

    Language: English - Date: 2013-03-13 14:40:05
    515Surveillance / Security / Biometrics / Computer network security / Gait analysis / Orthopedic surgery / Spoofing attack / Gait / Facial recognition system / Locomotion / Medicine / Motion

    Can Gait Biometrics be Spoofed?∗ A. Hadid, M. Ghahramani, V. Kellokumpu, M. Pietik¨ainen Center for Machine Vision Research, University of Oulu, Finland J. Bustard & M. Nixon School of Electronics and Computer Science

    Add to Reading List

    Source URL: www.ee.oulu.fi

    Language: English - Date: 2012-04-06 05:12:29
    516Shellcode / Malware / Software bugs / Hooking / Polymorphic code / Windows API / Code injection / Exploit / Application programming interface / Cyberwarfare / Computer security / Computing

    Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks Techniques and Empirical Analyses Kevin Z. Snow Fabian Monrose

    Add to Reading List

    Source URL: wwwx.cs.unc.edu

    Language: English - Date: 2014-09-05 15:38:44
    517

    Reasoning about Resource-Bounded Knowledge Theory and Application to Security Protocol Analysis A Dissertation Presented to the Faculty of the Graduate School of Cornell University

    Add to Reading List

    Source URL: www.ccs.neu.edu

    Language: English - Date: 2005-06-07 21:43:52
      518Energy in the European Union / Politics of the European Union / Energy in Ukraine / Energy policy / Energy policy of the European Union / European Union / Gazprom / Energy security / Natural gas / Energy / Europe / Energy economics

      EU-Russia energy relations: a critical analysis Lisa Pick Abstract This paper examines EU/Russia energy relations in the aftermath of the 2006 gas crisis. It analyses the political dynamics and interests which underpin t

      Add to Reading List

      Source URL: www.polis.leeds.ac.uk

      Language: English - Date: 2012-09-10 08:51:37
      519Barack Obama / Luo people / Samantha Power / Susan Rice / Egypt / Foreign policy of the Barack Obama administration / Barack Obama foreign policy / International relations / Presidents of the United Nations Security Council / United States

      The US and Us: The Mitvim-DC Monthly Volume 1, Issue 7, July 2013 The US and Us: The Mitvim-DC Monthly is a monthly report on US-Middle East issues. Each report includes an analysis, a roundup of commentaries, and a pro

      Add to Reading List

      Source URL: www.mitvim.org.il

      Language: English - Date: 2014-07-08 03:05:13
      520Food security / Humanitarian aid / Security / Urban agriculture / Cowpea / Millet / Sorghum / Food and drink / Cereals / Agriculture

      HEA Outcome Analysis Technical Report COUNTRY : Nigeria

      Add to Reading List

      Source URL: hea-sahel.org

      Language: English - Date: 2015-03-06 12:44:21
      UPDATE