Security architecture

Results: 5312



#Item
341Computing / Software / Computer architecture / Android / Smartphones / Alphabet Inc. / Intent / Mobile app / Google Play / Malware / Computer virus / Couple

On the Need of Precise Inter-App ICC Classification for Detecting Android Malware Collusions* Karim O. Elish, Danfeng (Daphne) Yao, and Barbara G. Ryder Department of Computer Science Virginia Tech Email: {kelish, danfen

Add to Reading List

Source URL: ieee-security.org

Language: English
342Software / Computing / Computer architecture / Smartphones / Android / Google Play / Vulnerability

On the Need of Precise Inter-App ICC Classification for Detecting Android Malware Collusions Karim O. Elish, Danfeng (Daphne) Yao, and Barbara G. Ryder

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-06-05 20:26:03
343Computing / Network architecture / Computer network security / OpenFlow / Cyberwarfare / OSI protocols / Transmission Control Protocol / Software-defined networking / SYN cookies / Denial-of-service attack / Data link layer / Forwarding plane

AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks Seungwon Shin† † Vinod Yegneswaran‡

Add to Reading List

Source URL: faculty.cse.tamu.edu

Language: English - Date: 2013-08-28 15:18:02
344Design / Visual arts / Architectural design / Crime prevention / Security engineering / Engineering / Architecture / Urban design / Crime prevention through environmental design / Parametric design / Computer-aided design / Natural surveillance

COMMUNITY PERFORMATIVE PARAMETRIC DESIGN Objective of Research The study will result in a demonstration installation of street light with kinetic response to environmental and user inputs. We will investigate feasibility

Add to Reading List

Source URL: www.fau.edu

Language: English - Date: 2015-07-16 09:45:36
345

Architecture & Security Overview The following document is intended to provide the reader with an overview of Conxport’s infrastructure, application architecture and Conxeo’s organizational philosophy regarding secur

Add to Reading List

Source URL: www.conxport.com

Language: English - Date: 2013-05-28 17:09:26
    346

    panoramic-security-camera-cctv-design-system-architecture.cdr

    Add to Reading List

    Source URL: www.viseum.co.uk

    Language: English - Date: 2016-01-25 10:00:09
      347Computing / Network architecture / Internet / Internet protocols / Computer network security / Internet Standards / Transmission Control Protocol / Tunneling protocols / Port knocking / SOCKS / Internet protocol suite / Port scanner

      S ILENT K NOCK: Practical, Provably Undetectable Authentication Eugene Y. Vasserman1 , Nicholas Hopper1, John Laxson2 , and James Tyra1 1 Computer Science and Engineering, University of Minnesota, Minneapolis, MN 55455

      Add to Reading List

      Source URL: www-users.cs.umn.edu

      Language: English - Date: 2007-07-26 16:56:51
      348Software / Microsoft Windows / Computer architecture / Internet Explorer / News aggregators / Windows Vista / Proprietary software / Internet Explorer 7 / Windows Server / Phishing / ActiveX / Windows CardSpace

      IE Security: Past, Present, and Future

      Add to Reading List

      Source URL: w2spconf.com

      Language: English - Date: 2012-02-07 16:10:03
      349Computing / Internet / Network architecture / Internet protocols / Secure communication / Dark web / Internet security / Tor / Onion routing / Traffic analysis / Proxy server / Transmission Control Protocol

      Low-Cost Traffic Analysis of Tor Steven J. Murdoch and George Danezis University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD United Kingdom {Steven.Murdoch,George.Danezis}@cl.cam.ac.uk

      Add to Reading List

      Source URL: www0.cs.ucl.ac.uk

      Language: English - Date: 2013-10-10 06:49:00
      350Internet / Domain name system / Computing / Network architecture / Internet protocols / Internet Standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / DNS spoofing / Name server / Time to live

      ./by-Rlt--prod-all-zn-lt-ttl.eps

      Add to Reading List

      Source URL: irl.cs.ucla.edu

      Language: English - Date: 2009-12-09 11:21:49
      UPDATE