Security analysis

Results: 6956



#Item
621

Can They Hear Me Now? A Security Analysis of Law Enforcement Wiretaps Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark, and Matt Blaze Dept. of Computer and Information Science, University of Pennsylvania Philadelphia,

Add to Reading List

Source URL: www.crypto.com

Language: English - Date: 2009-11-13 12:23:25
    622

    Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2012-05-22 01:34:44
      623

      The Department of Defense’s Use of Private Security Contractors in Iraq and Afghanistan: Background, Analysis, and Options for Congress Moshe Schwartz Specialist in Defense Acquisition

      Add to Reading List

      Source URL: fpc.state.gov

      Language: English - Date: 2015-06-22 01:23:23
        624

        TNO Defence, Security and Safety TNO | Knowledge for business Quantitative Risk Analysis of stored explosives

        Add to Reading List

        Source URL: www.tno.nl

        Language: English
          625

          Automated analysis of security protocols with global state Steve Kremer INRIA Nancy - Grand’Est & Loria, France Abstract—Security APIs, key servers and protocols that need to keep the status of transactions, require

          Add to Reading List

          Source URL: ieee-security.org

          Language: English - Date: 2014-04-21 13:48:10
            626

            MARVEL principles of a method for semi-qualitative system behaviour and policy analysis Erik J.A. van Zijderveld TNO Defence, Security and Safety P.O. Box 96864, 2509 JG The Hague, The Netherlands

            Add to Reading List

            Source URL: www.tno.nl

            Language: English
              627

              2011 IEEE Symposium on Security and Privacy Click Trajectories: End-to-End Analysis of the Spam Value Chain ∗ ∗

              Add to Reading List

              Source URL: www.ieee-security.org

              Language: English - Date: 2011-04-10 18:07:06
                628

                Legal plurality: An analysis of power interplay in Mekong hydropower Diana Suhardiman and Mark Giordano Food Security in the Mekong The Water, Food, Energy Nexus Revisited Chiang Rai, Thailand

                Add to Reading List

                Source URL: www.watergovernance.org

                Language: English - Date: 2013-03-20 10:03:30
                  629

                  Poster: Prioritizing Intrusion Analysis Using Dempster-Shafer Theory students: Loai Zomlot, Sathya Chandran Sundaramurthy, faculty: Xinming Ou Dept. of Computing and Information Sciences - Kansas State University Manhatt

                  Add to Reading List

                  Source URL: www.ieee-security.org

                  Language: English - Date: 2011-05-18 11:12:44
                    630

                    Food Security: An Ecological–Social Analysis to Promote Social Development

                    Add to Reading List

                    Source URL: www.thecyberhood.net

                    Language: English - Date: 2011-11-18 02:04:59
                      UPDATE