Security

Results: 374843



#Item
221American Society for Industrial Security

American Society for Industrial Security

Add to Reading List

Source URL: www.asisonline.ch

Language: German - Date: 2017-06-14 02:18:54
    2221  Securing Augmented Reality Output Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner Paul G. Allen School of Computer Science & Engineering University of Washington

    1 Securing Augmented Reality Output Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner Paul G. Allen School of Computer Science & Engineering University of Washington

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 16:01:40
    223FROM THE EDITOR  Spectre, the Deep Firmware Threat Born before silicon-level security was deemed necessary, speculative execution is now something

    FROM THE EDITOR Spectre, the Deep Firmware Threat Born before silicon-level security was deemed necessary, speculative execution is now something

    Add to Reading List

    Source URL: www.eproductalert.com

    Language: English - Date: 2018-04-18 19:10:00
    224The state of IoT security Dr. Jose Nazario Director of Security Research, Fastly 2

    The state of IoT security Dr. Jose Nazario Director of Security Research, Fastly 2

    Add to Reading List

    Source URL: www.fastly.com

    Language: English - Date: 2018-01-30 17:09:37
    225EMERGING TRENDS IN REGIONAL SECURITY  SUB-SAHARAN AFRICA OPERATING IN COMPLEX ENVIRONMENTS SECONDA EDIZIONE DI

    EMERGING TRENDS IN REGIONAL SECURITY SUB-SAHARAN AFRICA OPERATING IN COMPLEX ENVIRONMENTS SECONDA EDIZIONE DI

    Add to Reading List

    Source URL: www.asisitaly.org

    Language: Italian - Date: 2018-09-19 08:55:15
      226Journal of Computer Security–657 DOIJCSIOS Press 601

      Journal of Computer Security–657 DOIJCSIOS Press 601

      Add to Reading List

      Source URL: www.doc.ic.ac.uk

      Language: English - Date: 2014-05-01 06:38:12
      227Prevention / Crime prevention / Cryptography / Information governance / National security / Security engineering / Security / Computer security / Black Hat Briefings / Information security

      Subject: Request to Attend Black Hat USA Conference 2017 Dear [decision maker name], I’m writing to request your approval for me to attend the Black Hat USA Information Security Conference to be held July 22-27, 2017 i

      Add to Reading List

      Source URL: www.blackhat.com

      Language: English - Date: 2018-05-11 13:28:17
      228Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks Sunghwan Kim, Seunghyun Yoon, and Hyuk Lim School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technol

      Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks Sunghwan Kim, Seunghyun Yoon, and Hyuk Lim School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technol

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-05-14 15:46:40
      229Coordinated Annual Review on Defence (CARD) The EU Global Strategy (EUGS) presented in June 2016 by Federica Mogherini, the High Representative for Foreign Affairs and Security Policy/Vice-President of the Commission and

      Coordinated Annual Review on Defence (CARD) The EU Global Strategy (EUGS) presented in June 2016 by Federica Mogherini, the High Representative for Foreign Affairs and Security Policy/Vice-President of the Commission and

      Add to Reading List

      Source URL: eeas.europa.eu

      Language: English - Date: 2017-12-11 11:58:17
      230Poster: IoTcube: An Automated Analysis Platform for Finding Security Vulnerabilities Seulbae Kim, Seunghoon Woo, Heejo Lee, Hakjoo Oh Department of Computer Science and Engineering Korea University Seoul, Korea

      Poster: IoTcube: An Automated Analysis Platform for Finding Security Vulnerabilities Seulbae Kim, Seunghoon Woo, Heejo Lee, Hakjoo Oh Department of Computer Science and Engineering Korea University Seoul, Korea

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-05-21 15:07:31