Security analysis

Results: 6956



#Item
961Cyberwarfare / Application firewall / Stateful firewall / Distributed firewall / Firewall / Network security / Network address translation / Computer network / Network switch / Computer network security / Computing / Computer security

DEPEND 2014 : The Seventh International Conference on Dependability Network-Security-Policy Analysis Christian Pitscheider Dip. di Automatica e Informatica

Add to Reading List

Source URL: security.polito.it

Language: English - Date: 2015-02-16 02:27:52
962Infrastructure / Public safety / Computer crimes / Critical infrastructure protection / Security engineering / International Multilateral Partnership Against Cyber Threats / Computer security / Critical infrastructure / National security / United States Department of Homeland Security / Security

Testimony for the record of Denise Anderson On Behalf of the The Financial Services Information Sharing & Analysis Center and the National Council of Information Sharing and Analysis Centers Before the

Add to Reading List

Source URL: www.fsscc.org

Language: English - Date: 2015-03-04 14:40:41
963Military intelligence / Intelligence analysis / Intelligence gathering disciplines / Counter-intelligence / Intelligence / Counterintelligence / Defense Intelligence Agency / Central Intelligence Agency / Human intelligence / Espionage / National security / Data collection

Microsoft Word - Definitions 2 May 2011

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 20:16:24
964National accounts / Concurrency control / Lock / Gross domestic product / Access control / Password / Security engineering / Security / Computer security

UNITED STATES DEPARTMENT OF COMMERCE Economics and Statistics Administration BUREAU OF ECONOMIC ANALYSIS Washington, D.C.

Add to Reading List

Source URL: www.bea.gov

Language: English - Date: 2015-03-17 15:51:55
965Climatology / Data sharing / Environmental science / Scientific method / Scientific misconduct / Situation awareness / Computer security / Cyberwarfare / War / Security / Hacking / Science

Discussion Draft Straw man architecture for International data exchange and collaborative analysis John C. Mallery ()

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-14 13:46:13
966Internet standards / Computer network security / Denial-of-service attacks / Tcpdump / Pcap / Transport Layer Security / Router / Transmission Control Protocol / Denial-of-service attack / Software / Computing / Network architecture

Another Perspective to IP-Darkspace Analysis RESTENA - CSIRT Computer Security Incident Response Team Alexandre Dulaunoy, G´erard

Add to Reading List

Source URL: static.sstic.org

Language: English - Date: 2013-06-27 13:06:37
967Risk analysis / Public administration / Government / European Network and Information Security Agency / Working group / Data security

1 www.enisa.eu.int ENISA’s role in achieving a culture of network and

Add to Reading List

Source URL: ispa.maz24.com

Language: English - Date: 2012-01-11 03:01:11
968Public services / Measurement / Water technology / Electric power / Automatic meter reading / Automation / Smart meter / Electricity meter / Smart grid / Technology / Energy / Electric power distribution

Neighborhood Watch: Security and Privacy Analysis of Automatic Meter Reading Systems Ishtiaq Rouf∗ , Hossen Mustafa∗, Miao Xu, Wenyuan Xu† University of South Carolina

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2012-08-10 17:18:58
969National security / Security / Error detection and correction / Computer security

Consistency Under Deception Implies Integrity From Fred Cohen & Associates - Analyst Report and Newsletter Consistency analysis has been found useful in detecting corruptions of all sorts, ranging from accidental bit fli

Add to Reading List

Source URL: all.net

Language: English - Date: 2013-07-10 14:09:34
970Computer graphics / Scientific modeling / Visualization / Social network analysis software / Graph theory / Infographics / Computational science / Science

Software Matrix Layout Matrix visualizations of graphs are attracting widespread interest in fields such as social networks, security visualization, bio-chemistry, or software engineering. Analysts of social networks de

Add to Reading List

Source URL: www-hagen.cs.uni-kl.de

Language: English - Date: 2014-05-22 09:34:28
UPDATE