Security

Results: 374843



#Item
21Computer security / Computing / Cyberwarfare / Computer network security / Security engineering / Crime prevention / Cryptography / National security / Threat model / Threat / STRIDE / Information security

Threat modeling, incident command, & DDoS mitigation Maarten Van Horenbeeck Vp of Security Engineering, Fastly Dr. Jose Nazario

Add to Reading List

Source URL: www.fastly.com

Language: English - Date: 2018-01-30 17:52:40
22Computing / Free software / Internet privacy / File sharing / Peer-to-peer computing / Distributed data storage / Internet protocols / Dark web / ZeroNet / Peer-to-peer / I2P / Distributed hash table

Paper Title (use style: paper title)

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 16:10:18
23World Wide Web / Digital marketing / Internet search engines / Search engine optimization / Spamming / HTML / Meta element / Google Search / Reserved word / Spamdexing / Baidu / AdWords

How to Learn Klingon Without a Dictionary: Detection and Measurement of Black Keywords Used by the Underground Economy Hao Yang1 , Xiulin Ma1 , Kun Du1 , Zhou Li2 , Haixin Duan1* , Xiaodong Su3 , Guang Liu3 , Zhifeng Gen

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:24
24Economy / Finance / Money / Corporate finance / Entrepreneurship / Equity securities / Stock market / Private equity / Venture capital / Crowdfunding / Investor / Security

BUILDING A REGULATED INVESTMENT PLATFORM AND SECURITY TOKEN EXCHANGE FOR START-UPS AND SMEs WHITEPAPER Q4 2018 AUTHORS D. ACHOUR, L. ALDOORY, H. KHOURY,

Add to Reading List

Source URL: www.kambio.io

Language: English - Date: 2018-10-18 01:47:10
25Software / Computing / Web browsers / JavaScript / Google Chrome / Firefox / Content Security Policy / Browser extension / Document Object Model / Browser security / Chromium / Adobe Flash

Session A4: Browsers CCS’17, October 30-November 3, 2017, Dallas, TX, USA Most Websites Don’t Need to Vibrate: A Cost–Benefit Approach to Improving Browser Security

Add to Reading List

Source URL: acmccs.github.io

Language: English - Date: 2017-12-30 21:51:58
26Cryptography / Computational complexity theory / Complexity classes / Cryptographic protocols / Non-interactive zero-knowledge proof / Interactive proof system / Proof of knowledge / Zero-knowledge proof / NP / Zero knowledge / IP / Soundness

ZKProof Standards Security Track Proceedings 1 August 2018 + subsequent revisions This document is an ongoing work in progress. Feedback and contributions are encouraged. Track chairs:​​

Add to Reading List

Source URL: zkproof.org

Language: English - Date: 2018-10-25 10:32:39
27Political science / International relations / Global politics / Conflict / Conflict resolution / Dispute resolution / Family therapy / Reconciliation / Wiegand / Peace and conflict studies / American University School of International Service / Territorial dispute

DR. KRISTA E. WIEGAND Director, Global Security Program Howard H. Baker Jr. Center for Public Policy University of Tennessee, Knoxville 1640 Cumberland Ave. Knoxville, TN

Add to Reading List

Source URL: www.kristawiegand.com

Language: English - Date: 2018-09-10 12:37:41
28Computing / Free software / Dark web / Internet / Cryptographic protocols / Internet Standards / Computer network security / Tor / .onion / Botnet / Internet privacy / Bipartite graph

HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 23:38:22
29Computer programming / Computing / Mathematics / Theoretical computer science / Boolean algebra / Error detection and correction / Compiler construction / Hash function / Avalanche effect / Optimizing compiler / Recursion / MD5

Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping Dongpeng Xu The Pennsylvania State University University Park, USA Email:

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:56:44
30Software / Computing / System software / Instant messaging clients / Internet privacy / Cross-platform software / Cryptographic software / Public key infrastructure / Email encryption / IMessage / Secure communication / Threema

Obstacles to the Adoption of Secure Communication Tools Ruba Abu-Salma M. Angela Sasse

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:17
UPDATE