Security analysis

Results: 6956



#Item
791Spatial data analysis / Crime mapping / Human geography / Geographic information system / CrimeStat / Spatial analysis / Thematic map / CompStat / Crime analysis / Statistics / Criminology / Law enforcement

This is a pre-print of a journal article accepted for publication by the Security Journal inIt is a post-peer-review, pre-copy-edit version of the paper that is found at http://www.palgravejournals.com/sj/journal/

Add to Reading List

Source URL: discovery.ucl.ac.uk

Language: English - Date: 2013-09-12 10:48:52
792Public safety / Computer crimes / Cyberwarfare / Computer security / International Multilateral Partnership Against Cyber Threats / Einstein / United States Cyber Command / Threat / Privacy Office of the U.S. Department of Homeland Security / United States Department of Homeland Security / Computer network security / Security

ANALYSIS OF FEINSTEIN-CHAMBLISS CYBERSECURITY INFORMATION SHARING ACT OF 2014 DISCUSSION DRAFT RELEASED JUNE 17, 2014 June 24, 2014 This is an analysis of the Cybersecurity Information Sharing Act of 2014, which was rele

Add to Reading List

Source URL: d1ovv0c9tw0h0c.cloudfront.net

Language: English - Date: 2014-06-25 13:30:47
793Computer crimes / ISO standards / Ubiquitous computing / National security / Smart card / Digital security / Computer security / Identity theft / Credit card fraud / Computer network security / Crime / Security

PRESS RELEASE Europe Needs To Do More On Cybersecurity Issues Brussels, 16th of February 2015 – The European Commission has recently unveiled the results of a pan-European public opinion analysis on cybersecurity1, whi

Add to Reading List

Source URL: www.eurosmart.com

Language: English - Date: 2015-02-17 03:49:52
794Spatial analysis / CrimeStat / Crime mapping / Criminology / Statistics / Crime analysis

Hot Routes: PURPOSE & THEORY (2 of 5) Author: Henry Partridge, UCL Department of Security and Crime Science PURPOSE: Identifying where crime concentrates is one of the the principle aims of crime analysis. However, the s

Add to Reading List

Source URL: www.ucl.ac.uk

Language: English - Date: 2013-07-22 06:35:20
795Computer crimes / Bank fraud / Zeus / Malware / Computer security / Kaspersky Lab / Software / Spamming / Antivirus software / System software / Botnets

The Luuuk banking fraud campaign: half a million euros stolen in a single week The Luuuk banking fraud campaign: half a million euros stolen in a single week The experts at Kaspersky Lab’s Global Research and Analysis

Add to Reading List

Source URL: press.kaspersky.com

Language: English - Date: 2014-06-20 07:32:13
796Federal administration of Switzerland / Safety / Management / Security / Central Intelligence Agency / McLean /  Virginia / Occupational safety and health

Office of Environment, Health, Safety and Security (AU) Overview Safety Analysis Working Group Matthew Moury Associate Under Secretary Environment, Health, Safety

Add to Reading List

Source URL: www.efcog.org

Language: English - Date: 2015-02-07 18:34:00
797Global Monitoring for Environment and Security / Space policy of the European Union / Geographic information system / Geospatial analysis / Science / Situation awareness / Geography / Geospatial intelligence / Geographic information systems in geospatial intelligence / Cartography / Geodesy / European Space Agency

USE OF SPACE APPLICATIONS IN HUMANITARIAN OPERATIONS Report from the workshop Warsaw, 17-18 May 2012 During a large scale crisis effective management of the situation requires not only mobilisation of necessary resources

Add to Reading List

Source URL: swfound.org

Language: English - Date: 2012-12-13 10:18:23
798System software / Electronic voting / Information society / Malware / Botnet / Server / X Window System / Internet Relay Chat / Client honeypot / Computing / Software / Computer network security

Security Analysis of the Estonian Internet Voting System J. Alex Halderman1 Harri Hursti Jason Kitcat2 Margaret MacAlpine Travis Finkenauer1 Drew Springall1 1 University of Michigan, Ann Arbor, MI, U.S.A.

Add to Reading List

Source URL: www.verifiedvoting.org

Language: English - Date: 2014-10-07 12:28:22
799Cyberwarfare / Software / Software quality / Frama-C / Static program analysis / Vulnerability / Software security assurance / Security testing / Application security / Software testing / Security / Computer security

SOURCE CODE ANALYSIS TOOLBOX FOR SOFTWARE SECURITY ASSURANCE The objective of STANCE is to enable the adoption of program analysis tools as part of security assurance practices and certification

Add to Reading List

Source URL: www.stance-project.eu

Language: English - Date: 2015-04-28 04:21:11
800Privacy / Public safety / Measuring instruments / Aviation security / Child welfare / Full body scanner / Transportation Security Administration / Surveillance / Marc Rotenberg / Security / Ethics / Crime prevention

MEMORANDUM Date: January 11, 2010 To: Interested Persons From: EPIC – Marc Rotenberg, John Verdi, Ginger McCall RE: Preliminary Analysis: Documents obtained from Department of Homeland Security concerning Body Scanners

Add to Reading List

Source URL: epic.org

Language: English - Date: 2010-11-22 11:13:51
UPDATE