Security service

Results: 24048



#Item
1Dark web / Computing / Internet / Secure communication / Cryptographic protocols / Information and communications technology / Fingerprinting algorithms / Tor / .onion / Internet privacy / Operation Onymous / Computer network

Poster: Fingerprinting Hidden Service Circuits from a Tor Middle Relay Marc Juarez Rob Jansen

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-06-21 13:36:21
2Computing / Denial-of-service attacks / Cyberwarfare / Cybercrime / Botnets / Computer network security / Denial-of-service attack / Mirai / Internet of things / Low Orbit Ion Cannon / Universal Plug and Play / Computer security

EECS 388 Intro to Computer Security October 21, 2016 Homework 4: Denial of Service

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:20
3Mobile technology / Technology / Information and communications technology / Mobile telecommunications / Computer network security / Femtocell / Wi-Fi / Anomaly detection / GSM / Generic Access Network / SMS / Network security

SEVENTH FRAMEWORK PROGRAMME Trustworthy ICT Project Title: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem

Add to Reading List

Source URL: mavroud.is

Language: English - Date: 2018-10-23 09:34:50
4Computer security / Security engineering / Cyberwarfare / Prevention / Cybercrime / National security / Computer network security / Cyberattack / Capture the flag / Information security / Denial-of-service attack

Poster: Shell We Play A Game? CTF-as-a-service for Security Education Adam Doup´e and Giovanni Vigna Arizona State University and UC Santa Barbara ,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 00:24:26
5Machine learning / Learning / Artificial intelligence / Covariance and correlation / Data analysis / Dimension reduction / Anomaly detection / Data mining / Data security / Principal component analysis / Pearson correlation coefficient / Correlation and dependence

SEVENTH FRAMEWORK PROGRAMME Trustworthy ICT Project Title: Enhanced Network Security for Seamless Service Provisioning

Add to Reading List

Source URL: mavroud.is

Language: English - Date: 2018-10-23 09:34:50
6

Web Service and Single Sign-On Security Training Christian Mainka (@CheariX) 1

Add to Reading List

Source URL: www.hackmanit.de

Language: English - Date: 2017-01-19 04:09:18
    7

    Security Configuration Assessment (SCA) Getting Started Guide Security Configuration Assessment (SCA) is a lightweight cloud service which can quickly perform the configuration assessment of the IT assets, and centrally

    Add to Reading List

    Source URL: www.qualys.com

    Language: English - Date: 2017-10-17 19:22:36
      8

         Service Organization Controls (SOC) 3  for   Security, Availability and Confidentiality   

      Add to Reading List

      Source URL: pages.newvoicemedia.com

      Language: English - Date: 2018-08-16 17:56:51
        9

        GLOBAL Arbor Networks ATLAS® ATLAS is a collaborative project between Arbor Networks, the security division of NETSCOUT, and 400 service provider customers who have agreed to share anonymous traffic data with us. ATLAS

        Add to Reading List

        Source URL: resources.arbornetworks.com

        Language: English - Date: 2018-01-04 13:54:43
          10

          Notice of Security Enhancement for Online Investment Service In order to further strengthen the security of online investment services, with effect from 27 April 2018 (“Effective Date”), customers will be required to

          Add to Reading List

          Source URL: www.dahsing.com

          Language: English - Date: 2018-03-22 22:55:15
            UPDATE