Attack model

Results: 101



#Item
51Espionage / Security / Ciphertext indistinguishability / Ciphertext / RSA / Cipher / Known-plaintext attack / Adaptive chosen-ciphertext attack / Semantic security / Cryptography / Public-key cryptography / Cyberwarfare

Revisiting the Security Model for Timed-Release Encryption with Pre-Open Capability Alexander W. Dent1 and Qiang Tang1,2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-06-28 10:39:30
52Drosophila / Aggression / Behavior / Biology / Reproduction / Drosophilidae / Drosophila melanogaster / Pheromone

What makes flies attack? 23 November 2010 School, used Drosophila as a model system in which to address this question. In fruit flies, sex is cell specific, yet the sex of cells and tissues can be changed by altering the

Add to Reading List

Source URL: phys.org

Language: English - Date: 2015-02-08 11:34:45
53Security / Intrusion detection system / Advanced persistent threat / Network intrusion detection system / Threat / Zero-day attack / Adversary model / Computer network security / Cyberwarfare / Computer security

Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains Eric M. Hutchins∗, Michael J. Cloppert†, Rohan M. Amin, Ph.D.‡ Lockheed Martin Corporation

Add to Reading List

Source URL: papers.rohanamin.com

Language: English - Date: 2011-08-10 17:29:42
54Military technology / Cyberwarfare / War / Attack / Productivity / Technology / Electronic warfare / Hacking

ABSTRACT FOR A PRESENTATION ON Assessing the Contribution of Cyber-Attacks to Military Operations: Applying the Value Creation / Value Destruction Model in a Non-Monetary Context by Scott Borg Director and Chief Economi

Add to Reading List

Source URL: usacac.army.mil

Language: English - Date: 2008-10-02 13:11:53
55

Pervasive Attack: 
 A Threat Model ! draft-barnes-pervasive-problem-00

Add to Reading List

Source URL: down.dsg.cs.tcd.ie

- Date: 2014-03-01 03:17:05
    56Secure communication / Internet privacy / Man-in-the-middle attack / HTTP cookie / HTTP Secure / Public-key cryptography / Cryptography / HTTP / Cryptographic protocols

    draft-barnes-pervasive-problem-00 - Pervasive Attack: A Threat Model and Problem Statement

    Add to Reading List

    Source URL: www.w3.org

    Language: English - Date: 2014-02-07 14:41:45
    57Hydraulic engineering / Physical geography / Hydrogeology / Geotechnical engineering / Groundwater model / Groundwater / Water table / Attack on Pearl Harbor / Total petroleum hydrocarbon / Water / Hydrology / Aquifers

    Microsoft Word - Type 1 Report[removed]

    Add to Reading List

    Source URL: health.hawaii.gov

    Language: English - Date: 2014-10-07 23:22:40
    58Ecological succession / Fire / Wildfire / Bark beetle / Lumber / Fuel model / Ecology / Biology / Environment / Curculionidae / Woodboring beetles / Mountain pine beetle

    Growing season averages and extremes of the time to ignition for lodgepole pine foliage across the early stages of an MPB attack.

    Add to Reading List

    Source URL: wfdss.usgs.gov

    Language: English - Date: 2014-09-11 10:10:36
    59Security / Malware / Zero-day attack / Advanced persistent threat / Threat / Attack / Cisco Systems / Network security / Wireless security / Computer network security / Cyberwarfare / Computer security

    White Paper Addressing the Full Attack Continuum: Before, During, and After an Attack It’s Time for a New Security Model Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that

    Add to Reading List

    Source URL: www.cisco.com

    Language: English
    60Space technology / Flight / Lift / Drag / Model aircraft / Aircraft / Rocket / Angle of attack / Wing / Aerospace engineering / Aerodynamics / Fluid dynamics

    Flight and Space (PLTW) Primary Career Cluster: Science, Technology, Engineering, and Mathematics (STEM)

    Add to Reading List

    Source URL: tn.gov

    Language: English - Date: 2014-09-02 12:43:35
    UPDATE