Security

Results: 374843



#Item
221

American Society for Industrial Security

Add to Reading List

Source URL: www.asisonline.ch

Language: German - Date: 2017-06-14 02:18:54
    222Humancomputer interaction / Reality / Computing / User interface techniques / Augmented reality / Mixed reality / Virtual reality / Multimodal interaction / Microsoft HoloLens / Head-mounted display / Internet privacy / JavaScript

    1 Securing Augmented Reality Output Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner Paul G. Allen School of Computer Science & Engineering University of Washington

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 16:01:40
    223Computer hardware / Computing / Technology / Computer security / Side-channel attacks / X86 architecture / Intel / Meltdown / Spectre / Wind River Systems / Advanced Micro Devices / Internet of things

    FROM THE EDITOR Spectre, the Deep Firmware Threat Born before silicon-level security was deemed necessary, speculative execution is now something

    Add to Reading List

    Source URL: www.eproductalert.com

    Language: English - Date: 2018-04-18 19:10:00
    224Computing / Cyberwarfare / Cybercrime / Botnets / Computer network security / Denial-of-service attacks / Linux malware / Mirai / Internet of things / Denial-of-service attack / Computer security / BASHLITE

    The state of IoT security Dr. Jose Nazario Director of Security Research, Fastly 2

    Add to Reading List

    Source URL: www.fastly.com

    Language: English - Date: 2018-01-30 17:09:37
    225

    EMERGING TRENDS IN REGIONAL SECURITY SUB-SAHARAN AFRICA OPERATING IN COMPLEX ENVIRONMENTS SECONDA EDIZIONE DI

    Add to Reading List

    Source URL: www.asisitaly.org

    Language: Italian - Date: 2018-09-19 08:55:15
      226Computing / Computer access control / Computer security / Cloud standards / Federated identity / Internet protocols / Cryptographic protocols / OAuth / Cross-site request forgery / Social login / OpenID / Single sign-on

      Journal of Computer Security–657 DOIJCSIOS Press 601

      Add to Reading List

      Source URL: www.doc.ic.ac.uk

      Language: English - Date: 2014-05-01 06:38:12
      227Prevention / Crime prevention / Cryptography / Information governance / National security / Security engineering / Security / Computer security / Black Hat Briefings / Information security

      Subject: Request to Attend Black Hat USA Conference 2017 Dear [decision maker name], I’m writing to request your approval for me to attend the Black Hat USA Information Security Conference to be held July 22-27, 2017 i

      Add to Reading List

      Source URL: www.blackhat.com

      Language: English - Date: 2018-05-11 13:28:17
      228System software / Computing / Utility software / Computer network security / Computer security / Configuration management / Network architecture / Software-defined networking / Intrusion detection system / Snort / OpenFlow / Traffic flow

      Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks Sunghwan Kim, Seunghyun Yoon, and Hyuk Lim School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technol

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-05-14 15:46:40
      229Military / International relations / Coordinated Annual Review on Defence / Military of the European Union / European Union Military Staff / European External Action Service / Common Security and Defence Policy / European Defence Agency / United Nations General Assembly observers / EDA / Permanent Structured Cooperation / NATO

      Coordinated Annual Review on Defence (CARD) The EU Global Strategy (EUGS) presented in June 2016 by Federica Mogherini, the High Representative for Foreign Affairs and Security Policy/Vice-President of the Commission and

      Add to Reading List

      Source URL: eeas.europa.eu

      Language: English - Date: 2017-12-11 11:58:17
      230Software testing / Computer security / Security engineering / Cyberwarfare / Cybercrime / Computer network security / Fuzzing / Software bugs / Application security / Vulnerability / Internet of things / Heartbleed

      Poster: IoTcube: An Automated Analysis Platform for Finding Security Vulnerabilities Seulbae Kim, Seunghoon Woo, Heejo Lee, Hakjoo Oh Department of Computer Science and Engineering Korea University Seoul, Korea

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-05-21 15:07:31
      UPDATE