Security analysis

Results: 6956



#Item
851Computer security / Internet privacy / Privacy / Cooperative Association for Internet Data Analysis / Risk / Threat / Ethics / Identity management / Social issues


Erin
Kenneally,
M.F.S.,
J.D.
 
kc
Claffy,
Ph.D.
 Cooperative
Association
for
Internet
Data
Analysis
 University
of
California
San
Diego


Add to Reading List

Source URL: senseable.mit.edu

Language: English - Date: 2009-10-22 14:12:35
852Federal Bureau of Investigation / Fingerprints / DNA / Surveillance / Integrated Automated Fingerprint Identification System / Combined DNA Index System / Criminal Justice Information Services Division / DNA profiling / DNA Analysis Backlog Elimination Act / Biometrics / Security / Government

NoIN THE Supreme Court of the United States ———— STATE OF MARYLAND,

Add to Reading List

Source URL: sblog.s3.amazonaws.com

Language: English - Date: 2013-02-07 10:59:02
853Public-key cryptography / Domain name system / Internet standards / Domain Name System Security Extensions / Key size / Key / Brute-force attack / Cryptanalysis / Key generation / Cryptography / Key management / Internet protocols

DNSSEC Key Maintenance Analysis_final

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:09
854Android devices / Google / Embedded Linux / Android / Mobile application development / Microsoft App-V / Flow network / Nexus One / Java / Computing / Software / Smartphones

Multi-App Security Analysis with FUSE: Statically Detecting Android App Collusion∗ Tristan Ravitch Galois, Inc

Add to Reading List

Source URL: galois.com

Language: English - Date: 2015-03-18 18:24:44
855Analysis of algorithms / Artificial intelligence / Game theory / Markov models / Tambe / Adversary model / Stackelberg competition / Markov decision process / Uncertainty / Statistics / Science / Markov processes

Journal of Artificial Intelligence Research367 Submitted 1/14; published 6/14 Game-Theoretic Security Patrolling with Dynamic Execution Uncertainty and a Case Study on a Real Transit System

Add to Reading List

Source URL: jair.org

Language: English - Date: 2014-06-19 15:08:32
856Software testing / Security / Hacking / Vulnerability / Application security / Penetration test / Cross-site scripting / Software bug / Software security assurance / Cyberwarfare / Computer security / Computer network security

ACROS Security: ACROS Application Security Analysis, Frequently Asked Questions ACROS Application Security Analysis Frequently Asked Questions 1. What is the ACROS Application Security Analysis?

Add to Reading List

Source URL: www.acrossecurity.com

Language: English - Date: 2014-07-21 13:42:08
857Fault injection / MARS / Substitution-permutation network / Message authentication codes / Poly1305-AES / AES implementations / Cryptography / Advanced Encryption Standard / Block ciphers

Security analysis and fault injection experiment on AES Olivier Faurax1,2 , Traian Muntean2 1 Ecole ´

Add to Reading List

Source URL: ofaurax.free.fr

Language: English - Date: 2008-03-30 13:20:25
858Computer security / Companies listed on the New York Stock Exchange / Computing / Malware / Netflow / Network security / Intrusion prevention system / Network Behavior Anomaly Detection / McAfee VirusScan / McAfee / Computer network security / System software

Data Sheet McAfee Network Threat Behavior Analysis Get complete visibility into network behavior and threats.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-05-05 14:02:43
859Financial markets / Short selling / Stock market / Financial regulation / Short / Securities lending / Data Explorers / Security / Margin / Finance / Financial economics / Economics

Empirical Analysis of Japanese Stock Lending Market: Estimation of effect of tightening of short-selling regulations Jun Uno Junya Umeno Risa Muroi

Add to Reading List

Source URL: www.saa.or.jp

Language: English - Date: 2010-11-03 23:55:12
860Security / Data security / Risk analysis / Vulnerability / Threat / Asset / Countermeasure / Firewall / Attack / Computer network security / Cyberwarfare / Computer security

An Approach to Security Policy Configuration Using Semantic Threat Graphs Simon N. Foley and William M. Fitzgerald Cork Constraint Computation Centre, Computer Science Department, University College Cork, Ireland s.foley

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2009-07-27 08:02:51
UPDATE