Security analysis

Results: 6956



#Item
521Email / Technology / Association for Computing Machinery / Programming Language Design and Implementation / Computing

Student Travel Grant Application ACM SIGPLAN 5th Workshop on Programming Languages and Analysis for Security (PLASToronto, Canada, June 10, 2010 Sponsored by

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2010-05-06 13:31:58
522Economics / Financial statement analysis / P/E ratio / Equity / Financial market / Security / Financial intermediary / Return on equity / Rate of return / Financial ratios / Finance / Financial economics

The relationship of accounting ratios in balance sheets Accounting Ratios are the ratios show the relationship between accounting data in a balance sheet, profit and loss account in a particular organization. The account

Add to Reading List

Source URL: eagle-essays.com

Language: English - Date: 2015-03-10 11:24:23
523Computer network security / Open Source Tripwire / Computer security / GTK+ / Wireless networking / Rootkit / Wireshark / Pcap / Malware / Software / System software / Computing

Chapter 10 Analysis of a Suspect Program: Linux Solutions in this chapter:

Add to Reading List

Source URL: scitechconnect.elsevier.com

Language: English - Date: 2015-03-19 08:13:16
524Law enforcement in Europe / Agencies of the European Union / Europol / Radicalization / United States Department of Homeland Security / Fusion center / Counter-terrorism / Terrorism / ETA / Government / National security / Politics

Analysis “Call it intercontinental collaboration”: radicalisation, violent extremism and fusion centres Chris Jones September 2014 State activity aimed at dealing with “radicalisation” and “violent extremism”

Add to Reading List

Source URL: www.statewatch.org

Language: English - Date: 2014-09-11 14:35:21
525Malware / Computer network security / Security / Rootkit / Computer virus / Analysis / Threat / Computer security / Cyberwarfare / Antivirus software

Paper Title (use style: paper title)

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:23
526Sociology / Discrimination / European Union / European Union directives / Fundamental Rights Agency / Racial profiling / Institutional racism / Racial Equality Directive / Racism / Ethics / Anti-racism / Law

Analysis  Growing racism in the EU not just a Member State issue  Marie Martin    Ethnic  profiling  on  the  basis  of  security  concerns  is  not  new.  However,  as  the  European  Commi

Add to Reading List

Source URL: www.statewatch.org

Language: English - Date: 2012-09-06 12:39:34
527

To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robotics∗ Tamara Bonaci† , Jeffrey Herron † , Tariq Yusuf‡ , Junjie Yan† , Tadayoshi Kohno‡ , Howard Ja

Add to Reading List

Source URL: 45.33.36.144

Language: English - Date: 2015-05-14 18:28:36
    528Automation / Industrial automation / SCADA / Modbus / Honeypot / Computer security / Technology / Computer network security / Telemetry

    Cybersecurity on SCADA: risk prediction, analysis and reaction tools for Critical Infrastructures SCADA Honeypot Innovative system developed and by :

    Add to Reading List

    Source URL: www.cockpitci.eu

    Language: English - Date: 2015-02-10 15:15:17
    529Digital photography / Agriculture / Pixel / Imaging / Technology / Remote sensing / Normalized Difference Vegetation Index / Computer graphics

    Frequently Asked Questions (FAQ) What are GCE 1km Crop Dominance (aka GCE V0.0) product and GCE 1km Multi-study Crop Mask (aka GCE V1.0) products? Global Food Security-support Analysis Data @ 30 m (GFSAD30) will be produ

    Add to Reading List

    Source URL: e4ftl01.cr.usgs.gov

    Language: English
    530Data security / Risk analysis / Hacking / European Network and Information Security Agency / Data breach / Vulnerability / Computer security / Cyberwarfare / Security

    Responding to Data Breaches October the 23rd, 2009 Brussels, European Parliament Pascal Lointier President, CLUSIF

    Add to Reading List

    Source URL: www.clusif.fr

    Language: English - Date: 2010-10-26 06:14:31
    UPDATE