Trojan

Results: 685



#Item
201

Tycho Walaardt Het Paard van Troje Het verlenen van asiel door Nederland in de periodeThe Trojan Horse. Outsider and insider influence on obtaining asylum in the Netherlands in the first decade after the Seco

Add to Reading List

Source URL: www.tseg.nl

Language: Dutch - Date: 2010-09-22 10:41:48
    202Fabless semiconductor companies / Reconfigurable computing / Field-programmable gate array / Xilinx / Semiconductor intellectual property core / Embedded system / Altera / Application-specific integrated circuit / Hardware Trojan / Electronic engineering / Electronics / Digital electronics

    Enhancing Trust in Reconfigurable Based Hardware Systems with Tags and Monitors Devu Manikantan Shila, Vivek Venugopalan Cameron D Patterson

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-05-07 22:23:51
    203Computer network security / Social engineering / Cybercrime / Association of American Universities / Carnegie Mellon University / Identity theft / Malware / Threat / Trojan horse / Computing / Internet / Computer security

    Authentication and Access Control in Distributed Systems

    Add to Reading List

    Source URL: cups.cs.cmu.edu

    Language: English - Date: 2008-05-02 14:42:00
    204

    GIS Oilfield Contractors Safety & Detection Services Group BATTERY SOLUTIONS Trojan

    Add to Reading List

    Source URL: www.gisy.com

    - Date: 2011-05-25 08:51:39
      205Computer network security / Hacking / Hardware Trojan / Vulnerability / Ring / Computer security / Cyberwarfare / Security

      HOSTIEEE International Symposium on

      Add to Reading List

      Source URL: www.engr.uconn.edu

      Language: English - Date: 2014-08-20 05:13:58
      206Firewall / Stateless / Computing / Computer network security / Cyberwarfare / Data security

      Setiri: Advances in Trojan Technology Roelof Temmingh Haroon Meer BlackHat Asia 2002

      Add to Reading List

      Source URL: www.blackhat.com

      Language: English - Date: 2014-12-16 19:06:21
      207Social engineering / Computing / Antivirus software / Multi-agent systems / Botnet / Microsoft Security Essentials / Computer virus / Computer worm / Trojan horse / Malware / System software / Computer network security

      Malware Research and Response at Microsoft Introducing the Microsoft Malware Protection Center June 2011 Malware Research and Response at Microsoft

      Add to Reading List

      Source URL: download.microsoft.com

      Language: English - Date: 2011-06-08 20:10:02
      208Security / Network security / Cyberwarfare / Trojan horse / Password / Hacker / Microsoft / Malware / Computer security / Computer network security / Computing / Social engineering

      Justifying Security Spending

      Add to Reading List

      Source URL: www.e-cop.net

      Language: English - Date: 2011-04-26 10:49:08
      209Scripting languages / Batch file / Trojan horse / Dir / ABC / Help / COM file / Computer virus / Environment variable / Computing / Software / Technical communication

      SETIRI – Advances in Trojan Technology Roelof Temmingh & Haroon Meer June 2002

      Add to Reading List

      Source URL: www.blackhat.com

      Language: English - Date: 2014-12-16 19:06:21
      210Software / Malware / Android Market / SMS / ESET / Android / Text messaging / Computer virus / Premium-rate telephone number / Technology / Smartphones / Mobile technology

      Boxer SMS Trojan The first threat of the kind targeting Latin American countries André Goujon / ESET Awareness & Research Specialist / Pablo Ramos / ESET Security Researcher /

      Add to Reading List

      Source URL: www.welivesecurity.com

      Language: English - Date: 2013-02-12 12:54:15
      UPDATE