Security analysis

Results: 6956



#Item
601

2011 IEEE Symposium on Security and Privacy Click Trajectories: End-to-End Analysis of the Spam Value Chain ∗ ∗

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2011-04-10 18:07:06
    602

    A few remarks on: Security Analysis on a Group Key Transfer Protocol Based on Secret Sharing M.Kim, N.Park, D.Won The authors of [2] misunderstood some important aspects of our paper

    Add to Reading List

    Source URL: ruxandraolimid.weebly.com

    Language: English - Date: 2014-03-02 09:19:38
      603

      integrating Food and Nutrition Security into Country Analysis and the UNDAF A Guidance Note for United Nations Country Teams

      Add to Reading List

      Source URL: toolkit.undg.org

      Language: English - Date: 2012-02-01 16:26:19
        604

        2011 IEEE Symposium on Security and Privacy How to Shop for Free Online Security Analysis of Cashier-as-a-Service Based Web Stores Rui Wang1, Shuo Chen2, XiaoFeng Wang1, Shaz Qadeer2 1

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2011-04-10 18:07:06
          605

          January 11, 2013 Louis B. Jacques, MD Director, Coverage and Analysis Group Centers for Medicare & Medicaid Services 7500 Security Blvd Baltimore, MD 21244

          Add to Reading List

          Source URL: www.wmis.org

          Language: English - Date: 2013-09-13 09:31:56
            606

            2013 IEEE Security and Privacy Workshops Understanding Network Forensics Analysis in an Operational Environment Xenofontas Dimitropoulos ETH Zurich Communication Systems Group

            Add to Reading List

            Source URL: www.ieee-security.org

            Language: English - Date: 2013-05-05 16:04:58
              607

              To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robotics∗ arXiv:1504.04339v1 [cs.RO] 16 Apr 2015

              Add to Reading List

              Source URL: arxiv.org

              Language: English - Date: 2015-04-16 20:31:39
                608

                2012 Audits of Covered Entity Compliance with HIPAA Privacy, Security and Breach Notification Rules Initial Analysis

                Add to Reading List

                Source URL: csrc.nist.gov

                Language: English - Date: 2013-05-20 18:51:26
                  609

                  S&P_2014 - Security Analysis of Control Flow Obfuscation

                  Add to Reading List

                  Source URL: www.ieee-security.org

                  Language: English - Date: 2014-05-07 16:20:27
                    610

                    Security Analysis of the Diebold AccuBasic Interpreter David Wagner David Jefferson Matt Bishop Voting Systems Technology Assessment Advisory Board (VSTAAB) with the assistance of:

                    Add to Reading List

                    Source URL: www.chriskarlof.com

                    Language: English - Date: 2012-01-02 15:39:36
                      UPDATE