Security engineering

Results: 11317



#Item
501Avionics / Embedded systems / Safety engineering / Software requirements / Electronic design / DO-178B / DO-254 / Computer security / Software / Configuration management / Reverse engineering / Federal Aviation Administration

Reverse Engineering for Software and Digital Systems

Add to Reading List

Source URL: www.tc.faa.gov

Language: English - Date: 2016-02-25 11:33:37
502

A Role-Based Delegation Model and Some Extensions Ezedin Barka and Ravi Sandhu Laboratory for Information Security Technology Information and Software Engineering Department, MS 4A4 George Mason University, Fairfax, VA 2

Add to Reading List

Source URL: www.profsandhu.com

Language: English - Date: 2008-02-07 14:26:04
    503

    Institute for Cyber Security The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security

    Add to Reading List

    Source URL: profsandhu.com

    Language: English - Date: 2014-03-20 11:57:50
      504Security / Social engineering / Hacking / Computing / Clickjacking / Cybercrime / World Wide Web / Framekiller / Computer security / Cross-site request forgery

      Introduction Attack vectors Counteractive measures Conclusion and outlook UI Redressing:

      Add to Reading List

      Source URL: www.nds.rub.de

      Language: English - Date: 2011-09-01 10:03:44
      505

      Cued Mnemonics for Better Security and Memorability Primal Wijesekera, Ivan Cherapau, Ayumi Samarakoon, Konstantin Beznosov Laboratory for Education and Research in Secure Systems Engineering ( LERSSE) University of Brit

      Add to Reading List

      Source URL: cups.cs.cmu.edu

      Language: English - Date: 2014-07-21 06:55:00
        506Cyberwarfare / Internet / Denial-of-service attacks / Computing / Internet security / Cyberspace / Internet Relay Chat / Denial-of-service attack / Incapsula / Bitcoin / Mt. Gox / Cloudflare

        Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem Marie Vasek, Micah Thornton, and Tyler Moore Computer Science and Engineering Department Southern Methodist University, Dallas, TX Email: {mvasek,m

        Add to Reading List

        Source URL: fc14.ifca.ai

        Language: English - Date: 2014-02-18 12:20:22
        507

        Telecom System Security Presented By: Rami Ailabouni Based on: Ross Anderson’s Book “Security Engineering” Lecture Contents 

        Add to Reading List

        Source URL: www.cs.haifa.ac.il

        Language: English
          508

          CprE 531: Information System Security Department of Electrical and Computer Engineering Iowa State University Coordinates: Fall 2013

          Add to Reading List

          Source URL: www.iac.iastate.edu

          Language: English - Date: 2014-01-28 12:04:32
            509Internet privacy / Network performance / Dark web / Wireless networking / Telecommunications engineering / Tor / Routing / Anonymity / Proxy server / Crowds / Anonymous remailer / Secure communication

            The Design and Implementation of the A3 Application-Aware Anonymity Platform Micah Sherra,∗, Harjot Gillb , Taher Aquil Saeedc,1 , Andrew Maod , William R. Marczake , Saravana Soundararajanf,1 , Wenchao Zhoua,1 , Boon

            Add to Reading List

            Source URL: security.cs.georgetown.edu

            Language: English - Date: 2013-10-29 14:55:45
            510Standards organizations / OSGi / Smartphones / Software architecture / Apache Felix / Android / Security token / Kernel / X Window System / Communications protocol / Component-based software engineering / Operating system

            Smart and Secure Cross-Device Apps for the Internet of Advanced Things Christoph Busold1 , Stephan Heuser1 , Jon Rios1 , Ahmad-Reza Sadeghi2 , and N. Asokan3 1

            Add to Reading List

            Source URL: fc15.ifca.ai

            Language: English - Date: 2015-01-11 00:32:46
            UPDATE