Security engineering

Results: 11317



#Item
541TC / Guan

TCSP Treasurer’s Report 2015 Yong  Guan     Department  of  Electrical  and  Computer  Engineering  

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-31 12:04:00
542

USENIX Security Symposium. San Jose, CA. 31 JulyReverse-Engineering a Cryptographic RFID Tag Karsten Nohl and David Evans University of Virginia Department of Computer Science

Add to Reading List

Source URL: www.proxmark.org

Language: English - Date: 2008-05-28 17:05:03
    543Cybercrime / Security / Computing / Cyberspace / Identity theft / Phishing / Social engineering / Spamming / Computer security / Website defacement / Transmission Control Protocol / World Wide Web

    JPCERT/CC Incident Handling Report [April 1, 2015 – June 30, 2015]

    Add to Reading List

    Source URL: www.jpcert.or.jp

    Language: English - Date: 2015-09-09 21:00:36
    544Government / Education / Science and technology / Small Business Administration / Small Business Innovation Research / Science /  technology /  engineering /  and mathematics / Office of Scientific and Technical Information / Office of Management and Budget / United States Department of Homeland Security / America COMPETES Act / Joint Ocean Commission Initiative

    July 9, 2015 MOF EXECUTIVE DEPARTMENTS AND AGENCIES

    Add to Reading List

    Source URL: www.whitehouse.gov

    Language: English - Date: 2015-07-09 19:42:49
    545Semiconductor device fabrication / Electronic engineering / Integrated circuits / Electronics / Electromagnetism / Fabless manufacturing / Semiconductor fabrication plant / Application-specific integrated circuit / Foundry model / Semiconductor consolidation

    a certicom application note Certicom Security for Fabless Semiconductor Design Companies control your outsourced manufacturing channel with a proven security solution that is

    Add to Reading List

    Source URL: www.certicom.com

    Language: English - Date: 2010-02-26 18:11:11
    546Computing / Network architecture / Computer network security / Emerging technologies / Network protocols / OpenFlow / Middlebox / Software-defined networking / Engineering / Computer network / Provisioning / Technology

    A Slick Control Plane for Network Middleboxes Bilal Anwer Theophilus Benson Georgia Tech

    Add to Reading List

    Source URL: conferences.sigcomm.org

    Language: English - Date: 2013-07-08 16:07:10
    547

    On the Security of Ballot Receipts in E2E Voting Systems Jeremy Clark, Aleks Essex, and Carlisle Adams School of Information Technology and Engineering (SITE), University of Ottawa {jclar037,aesse083,cadams}@site.uottawa

    Add to Reading List

    Source URL: users.encs.concordia.ca

    Language: English - Date: 2013-08-05 10:55:05
      548Computer network security / Computer security / Cryptography / Cyberwarfare / National security / Secure communication / Bachelor of Science in Information Technology / University of Limerick / Electrical engineering / Pulchok Campus / UP Diliman Electrical and Electronics Engineering Institute

      Technical image with pc board connected to testing wires. laptop, drawings and multimeter in scene.

      Add to Reading List

      Source URL: www.ece.ul.ie

      Language: English - Date: 2015-04-20 11:48:45
      549

      Security testing: a key challenge for software engineering Yves Le Traon, Professor, Univ of Luxembourg 1

      Add to Reading List

      Source URL: www.spacios.eu

      Language: English - Date: 2013-03-22 11:18:50
        550Spamming / Social engineering / Email / Cybercrime / Identity theft / Phishing / Web beacon / Microsoft SmartScreen / Spoofed URL

        Measuring the Human Factor of Cyber Security Brian M. Bowen, Ramaswamy Devarajan, Salvatore Stolfo Department of Computer Science Columbia University {bb2281, rd2446, sjs11}cs.columbia.edu

        Add to Reading List

        Source URL: ids.cs.columbia.edu

        Language: English - Date: 2012-09-17 11:40:55
        UPDATE