Security analysis

Results: 6956



#Item
641

Reference Model of the International Supply Chain with special reference to Trade Facilitation and Trade Security Source: UN/CEFACT/TBG-International Trade Procedures and Business Process Analysis Groups

Add to Reading List

Source URL: tfig.unece.org

Language: English - Date: 2013-04-18 04:12:56
    642

    TESTIMONY BY DR. GAL LUFT EXECUTIVE DIRECTOR, INSTITUTE FOR THE ANALYSIS OF GLOBAL SECURITY (IAGS) ADVISER, UNITED STATES ENERGY SECURITY COUNCIL Presented before HOUSE COMMITTEE ON FOREIGN AFFAIRS

    Add to Reading List

    Source URL: www.iags.org

    Language: English - Date: 2011-12-14 05:48:36
      643

      Security Analysis of Android Factory Resets Laurent Simon University of Cambridge Ross Anderson

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2015-05-25 04:32:40
        644

        Press Release No. 092 | lcp | June 25, 2014 For Secure Software: X-rays instead of Passport Control JOANA Software Analysis Tool Checks Source Text of a Program to Discover Security Gaps

        Add to Reading List

        Source URL: www.kit.edu

        Language: English - Date: 2014-08-21 04:21:47
          645

          Balancing for (In)Security: An Analysis of the Iranian Nuclear Crisis in the Light of the Cuban Missile Crisis1 Andreas BOCK* Abstract

          Add to Reading List

          Source URL: sam.gov.tr

          Language: English - Date: 2015-01-06 14:41:36
            646National security / Closed-circuit television / Autofocus / Video content analysis / Face detection / Edge detection / Surveillance / Security / Imaging

            Introduction of CCTV at Level Crossings  With automatic detection of potentially  Dangerous situations. Caroline Machy, Xavier Desurmont, Jean­François Delaigle Image Department  MULTITEL

            Add to Reading List

            Source URL: www.multitel.be

            Language: English - Date: 2008-12-18 04:17:54
            647Geography / National security / Geospatial intelligence / Geodesy / US Geospatial Intelligence Foundation / National Geospatial-Intelligence Agency / Commercial Joint Mapping Toolkit / Geospatial PDF / Geospatial analysis / Cartography / GIS software / Intelligence gathering disciplines

            CONFERENCE EXCLUSIVES Daily Agenda Show Highlights

            Add to Reading List

            Source URL: usgif.org

            Language: English - Date: 2010-11-15 17:43:15
            648George Andrew Olah / Hungarian people / Institute for the Analysis of Global Security / R. James Woolsey /  Jr. / United States / Robert McFarlane

            William Ball Former Sec. of Navy Gen. Barry McCaffrey

            Add to Reading List

            Source URL: www.methanolfuels.org

            Language: English - Date: 2014-03-20 12:00:57
            649

            ソニーの電子お薬手帳システムに適用した セキュリティ設計分析手法 松並 勝† Security Design Analysis Method applied to Sony’s Electronic Medication Notebooks System

            Add to Reading List

            Source URL: www.prime-pco.com

            Language: Japanese - Date: 2014-12-15 23:13:08
              650Symbol / Mathematics / Multiset / Parity of a permutation

              Automated analysis of security protocols with global state Steve Kremer INRIA Nancy - Grand’Est & Loria, France Abstract—Security APIs, key servers and protocols that need to keep the status of transactions, require

              Add to Reading List

              Source URL: www.ieee-security.org

              Language: English - Date: 2014-04-21 13:48:10
              UPDATE