Security analysis

Results: 6956



#Item
661Satellite imagery / Imagery analysis / Optics / Vision / Geography / Epistemic community / Imaging / Remote sensing

Philipp Olbrich Security, Knowledge and Technology Non-Governmental Satellite Imagery Analysis of North Korea’s Nuclear Threat Topic and Research Question

Add to Reading List

Source URL: ecos.univie.ac.at

Language: English - Date: 2015-02-24 08:19:23
662Cross-platform software / Java / CapDesk / Capability-based security / Sandbox / Computer security / Kernel / Computing / Software / System software

A Security Analysis of the Combex DarpaBrowser Architecture David Wagner Dean Tribble March 4, 2002 1 Introduction We describe the results of a limited-time evaluation of the security of the Combex DarpaBrowser, built on

Add to Reading List

Source URL: combex.com

Language: English - Date: 2005-08-18 16:59:47
663Natural gas / Shale gas / Petroleum production / Energy security / Hydraulic fracturing / Liquefied natural gas / Shale gas by country / Shale gas in the United States / Energy / Fuel gas / Petroleum

Ap: 2013nr6 Section: Analysis The ‘game changer’

Add to Reading List

Source URL: www.atlcom.nl

Language: English - Date: 2013-10-10 08:43:08
664Public finance / Macroeconomics / Generational accounting / Retirement / Government budget deficit / Laurence Kotlikoff / Social Security / Tax / Income tax / Fiscal policy / Economic policy / Public economics

Róbert Iván Gál - András Simonovits - Miklós Szabó – Géza Tarcali Generational accounts in Hungary Abstract In this study we present the results of a generational accounting for Hungary. The analysis

Add to Reading List

Source URL: www.tarki.hu

Language: English - Date: 2000-09-12 07:21:10
665Horn of Africa / Poverty / Humanitarian aid / Famines / East Africa drought / Famine / Food security / Somalia / World food price crisis / Africa / Development / Food politics

Famine in Southern Somalia: Questions & Answers Q1: How is “famine” defined? While there are various definitions of famine, many food security analysis agencies, including FSNAU and FEWS NET, use the definition refle

Add to Reading List

Source URL: www.fsnau.org

Language: English - Date: 2011-07-20 01:50:51
666Educational psychology / Factor analysis / Market research / Marketing / Psychometrics / Police / Analysis / Normality / Job interview / Behavior / Security / Mind

Chapter 16 Social Behaviour in Police Interviews: Relating Data to Theories Merijn Bruijnes, Jeroen Linssen, Rieks op den Akker, Mariët Theune, Sjoerd Wapperom, Chris Broekema, and Dirk Heylen

Add to Reading List

Source URL: eprints.eemcs.utwente.nl

Language: English - Date: 2015-03-27 09:11:18
667Surveillance / Crime prevention / Signals intelligence / Privacy of telecommunications / Privacy / Closed-circuit television / Foreign Intelligence Surveillance Act / Internet privacy / Traffic enforcement camera / National security / Security / Law enforcement

Security and Social Dimensions of City Surveillance Policy Analysis and Recommendations for Pittsburgh Ethics, History, and Public Policy Senior Capstone Project

Add to Reading List

Source URL: www.cmu.edu

Language: English - Date: 2015-04-23 17:58:36
668Internet censorship / Internet privacy / Proxy servers / Reverse proxy / Computer network security / Ultrasurf / Great Firewall of China / Internet censorship circumvention / Squid / Computing / Software / Internet

Technical analysis of the Ultrasurf proxying software Jacob Appelbaum The Tor Project Abstract Ultrasurf is a proxy-based program promoted for Internet censorship circumvention. This report gives a t

Add to Reading List

Source URL: media.torproject.org

Language: English - Date: 2012-04-16 15:36:36
669Software testing / Security / Hacking / Vulnerability / Attack / Password / Security risk / Social engineering / RSA / Computer network security / Cyberwarfare / Computer security

TRESPASS: Plug-and-Play Attacker Profiles for Security Risk Analysis Wolter Pieters∗† , Dina Hadˇziosmanovi´c∗ , Aleksandr Lenin‡ , Lorena Montoya† , and Jan Willemson‡ ∗ Delft University of Technology,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-05-07 16:20:44
670Computer hardware / Software / Android / Nexus One / Samsung Galaxy S / Secure Digital / HTC Desire S / HTC Desire / Universal Serial Bus / Smartphones / Android devices / Computing

Security Analysis of Android Factory Resets Laurent Simon University of Cambridge Ross Anderson

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-05-25 04:32:40
UPDATE