Security

Results: 374843



#Item
161Data management / Computing / Software / Relational database management systems / Cross-platform software / MySQL / Weka / SQL injection / Database server / Database / Application server / Code injection

Poster: Multi-source data analysis for SQL injection detection Kevin Ross, Melody Moh, Teng-Sheng Moh Jason Yao

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 00:41:20
162Internet / Computing / Free software / Dark web / Secure communication / Tor / Point guard / Guard mounting

Poster: Guard Sets in Tor Using AS Relationships Mohsen Imani Armon Barton Matthew Wright

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-10 21:07:00
163Computing / Software engineering / Computer programming / Software bugs / Shellcode / Debuggers / GNU Debugger / Debugging / Stack buffer overflow / Buffer overflow / Python / Stack

EECS 388 Intro to Computer Security October 28, 2016 Project 4: Application Security

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:20
164Economy / Types of insurance / Insurance / Finance / Social programs / Labour law / Insurance industry / Health insurance / Federal Department of Home Affairs / Federal administration of Switzerland / Unemployment benefits / Social security in Switzerland

Federal Department of Home Affairs FDHA Federal Social Insurance Office FSIO International Affairs Social Security for Posted Workers Non-contracting States

Add to Reading List

Source URL: www.bsv.admin.ch

Language: English
165Computing / Software / Cryptography / Transport Layer Security / HTTP Strict Transport Security / HTTP Public Key Pinning / HTTP cookie / Browser security / HTTPS / Public key certificate / Google Chrome / Firefox

Poster: Security Analysis of HSTS Implementation in Browsers Yan Jia1,2, Yuqing Zhang2,1 1 2

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-14 22:48:20
166Cryptography / Data Encryption Standard / Feistel cipher / Lucifer / MISTY1 / Block cipher / ICE / Tiny Encryption Algorithm

Introduction Security parameters Fixed-key Feistel & MISTY

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:37
167Law / Government / Searches and seizures / Digital forensics / Cellebrite / Border search exception / Surveillance / Mobile device forensics / Riley v. California / Internet privacy / United States Department of Homeland Security / Search and seizure

July 10, 2018 The Honorable Rand Paul, Chairman The Honorable Gary C. Peters, Ranking Member U.S. House Committee on Homeland Security Subcommittee on Federal Spending Oversight and Emergency Management H2-176 Ford House

Add to Reading List

Source URL: www.epic.org

Language: English - Date: 2018-07-10 16:35:43
168System software / Computer architecture / Software / Linus Torvalds / Cloud infrastructure / OpenStack / Virtual machine / Hyper-V / Hypervisor / Operating-system-level virtualization / Linux kernel / Middleware

* The speed of containers, the security of VMs KataContainers.io Contents

Add to Reading List

Source URL: katacontainers.io

Language: English - Date: 2018-03-16 09:16:49
169Information theory / Information / Information flow / Mutual information / Conditional entropy / Conditional mutual information / Quicken Interchange Format / Metaphysics / Knowledge

Calculating Quantitative Integrity and Security for Imperative Programs Tom Chothia1 , Chris Novakovic1 , and Rajiv Ranjan Singh2 1 2

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
170Social Security / Death Master File / Genealogy / DMF / Drug Master File

Social Security Death Master File (DMF) Do Not Pay (DNP) Quick Reference Card Frequently Asked Questions What is the Death Master File? The Death Master File (DMF) from the Social

Add to Reading List

Source URL: donotpay.treas.gov

Language: English - Date: 2017-08-08 12:59:58
UPDATE