State of Denial

Results: 182



#Item
11Computing / Hacking / Software testing / Alert correlation / Attack / Alert messaging / Buffer overflow / Vulnerability / Denial-of-service attack / Cyberwarfare / Computer security / Computer network security

Techniques and Tools for Analyzing Intrusion Alerts PENG NING, YUN CUI, DOUGLAS S. REEVES, and DINGBANG XU North Carolina State University Traditional intrusion detection systems (IDSs) focus on low-level attacks or anom

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:18
12Mike Rann / Australia / Mawson Lakes /  South Australia / Oceania / Adelaide / Premiers of South Australia / Grace Portolesi

FEATURES 8 STATE OF DENIAL The election saw many statements around employment

Add to Reading List

Source URL: louisepascale.com.au

Language: English - Date: 2011-03-24 08:00:43
13Asia / Armenian Genocide denial / Justin McCarthy / Heath W. Lowry / Vahakn Dadrian / Genocide denial / Genocide / Institute of Turkish Studies / Armenian language / Armenian Genocide / Criminal law / Linguistic typology

Professional Ethics and the Denial of Armenian Genocide Roger W. Smith College of William and Mary, Williamsburg, Virginia Eric Markusen Southwest State University, Marshall, Minnesota

Add to Reading List

Source URL: www.anca.org

Language: English - Date: 2009-06-19 17:32:04
14Software bugs / Computer errors / Assembly languages / Buffer overflow / Stack buffer overflow / Denial-of-service attack / Stack / Call stack / Address space layout randomization / Computing / Software engineering / Computer programming

Automatic Diagnosis and Response to Memory Corruption Vulnerabilities Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris Bookholt Cyber Defense Laboratory Department of Computer Science North Carolina State University

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:02
15Denial-of-service attack / Software / Computing / Crystal / Diff

Solid State Calculations Using gaussian: The Definitive Guide to G09 PBC Calculations April 25, 2012 Contents 1 Conventions Used in this Document

Add to Reading List

Source URL: scuseria.rice.edu

Language: English - Date: 2012-04-25 16:48:21
16Environmental skepticism / Al Gore / An Inconvenient Truth / Films / Global warming controversy / Effects of global warming / Ice sheet / Climate change denial / Dimmock v Secretary of State for Education and Skills / Climate change / Environment / Global warming

PDF Document

Add to Reading List

Source URL: skepticalscience.net

Language: English - Date: 2014-06-06 04:16:22
17Computing / Internet Protocol / Denial-of-service attacks / IPv6 deployment / Akamai Technologies / Denial-of-service attack / IPv4 address exhaustion / Internet access / World IPv6 Day / Network architecture / Internet / IPv6

Volume 6, Number 2 The State of the Internet 2nd Quarter, 2013 Report

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2013-10-16 13:52:00
18Community building / Experiential learning / Service-learning / American Association of State Colleges and Universities / Education / Alternative education / American society

CCPH Advanced Service-Learning Institute January 26-29, 2002 Erika Randall, CSU Director of Community Service Learning Denial:

Add to Reading List

Source URL: depts.washington.edu

Language: English - Date: 2004-03-04 19:29:00
19Computing / Password authentication protocol / Transmission Control Protocol / Public-key cryptography / Authentication / Denial-of-service attack / Message authentication code / Wireless sensor network / Man-in-the-middle attack / Cryptography / Computer network security / Cyberwarfare

Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:13
20Call centre / Telephony / For Official Use Only / Electronic engineering / 9-1-1 / Telephone call / Denial-of-service attack / Security / United States government secrecy / Computer telephony integration / National security

UNCLASSIFIED//FOR OFFICIAL USE ONLY Louisiana State Analytical & Fusion Exchange (LA-SAFE) 376A East Airport Baton Rouge, LASituational Advisory

Add to Reading List

Source URL: www.securelogix.com

Language: English - Date: 2013-04-13 23:10:21
UPDATE