Security analysis

Results: 6956



#Item
571

Semi-Invasive Attacks – A New Approach to Hardware Security Analysis Sergei P. Skorobogatov Summary Semiconductor chips are used today not only to control systems, but also to protect them against security threats. A c

Add to Reading List

Source URL: www.cl.cam.ac.uk

- Date: 2004-09-22 11:09:37
    572

    Cryptosense: Formal Analysis of Security APIs from Research to Spin-Off Graham Steel Cryptosense & INRIA Abstract. In this talk I’ll describe how our research project into adapting formal analysis techniques for crypt

    Add to Reading List

    Source URL: software.imdea.org

    - Date: 2014-07-17 09:25:51
      573

      TESTIMONY BY DR. GAL LUFT EXECUTIVE DIRECTOR INSTITUTE FOR THE ANALYSIS OF GLOBAL SECURITY (IAGS) Presented before HOUSE COMMITTEE ON FOREIGN AFFAIRS

      Add to Reading List

      Source URL: www.iags.org

      - Date: 2008-05-20 20:23:58
        574

        Palestinian Refugees in Lebanon: A Security Analysis Adam Leake Abstract The situation of Palestinian refugees represents one of the longest-running refugee situations in the world and the conditions faced by those livin

        Add to Reading List

        Source URL: www.polis.leeds.ac.uk

        - Date: 2015-01-14 07:35:04
          575

          Cruel Intentions: A Security Analysis of Web Intents Jenna Kallaher, Amal Krishnan, Paul Makowski, Eric Chen, Collin Jackson Carnegie Mellon University {jkallahe, achemman, pmakowsk}andrew.cmu.edu, {eric.chen, collin.jac

          Add to Reading List

          Source URL: www.w2spconf.com

          - Date: 2012-05-24 01:30:01
            576

            2014 IEEE Security and Privacy Workshops Insider Threat Identification by Process Analysis Matt Bishop∗ , Heather M. Conboy† , Huong Phan† , Borislava I. Simidchieva† , George S. Avrunin† , Lori A. Clarke†

            Add to Reading List

            Source URL: www.ieee-security.org

            - Date: 2014-04-30 03:09:49
              577

              MOBILITY CHOICE ROUNDTABLE Institute for the Analysis of Global Security Tuesday, May 25, 2010 Washington Convention Center, Room 102A 11:15– 12:30, Letting the Market Work: Pricing and Choice Two weeks ago the Kennedy

              Add to Reading List

              Source URL: www.mobilitychoice.org

              - Date: 2010-05-28 15:24:03
                578

                BETWEEN FREEDOM AND SECURITY RESEARCH ANALYSIS THE CURRENT RESEARCH HAS BEEN IMPLEMENTED BY PEACE DIALOGUE NGO IN THE FRAMEWORK OF THE PROJECT SAFE SOLDIERS FOR A SAFE ARMENIA,

                Add to Reading List

                Source URL: www.peacedialogue.am

                - Date: 2015-03-24 06:43:35
                  579

                  Reference Model of the International Supply Chain with special reference to Trade Facilitation and Trade Security Source: UN/CEFACT/TBG-International Trade Procedures and Business Process Analysis Groups

                  Add to Reading List

                  Source URL: tfig.unece.org

                  - Date: 2013-04-18 04:12:56
                    580

                    NASA\USGS Global Food Security-support Analysis Data @30 m GFSAD30 Short Name: GFSAD30; Nominal 1000 m Products GCE 1km Crop Dominance (aka GCE V0.0) GCE 1km Multi-study Crop Mask (aka GCE V1.0)

                    Add to Reading List

                    Source URL: e4ftl01.cr.usgs.gov

                      UPDATE