Attack model

Results: 101



#Item
61Logic in computer science / Model checking / Formal verification / POSIX / Device driver / At / C / Computing / Software / Formal methods

problems worthy of attack

Add to Reading List

Source URL: leecenter.caltech.edu

Language: English - Date: 2009-05-23 14:39:39
62Space technology / Flight / Lift / Drag / Model aircraft / Aircraft / Rocket / Angle of attack / Wing / Aerospace engineering / Aerodynamics / Fluid dynamics

Flight and Space (PLTW) Primary Career Cluster: Science, Technology, Engineering, and Mathematics (STEM)

Add to Reading List

Source URL: tennessee.gov

Language: English - Date: 2014-09-02 12:43:35
63Boolean algebra / Binary arithmetic / Linear feedback shift register / Stream cipher / Advanced Encryption Standard / Boolean function / Computational complexity theory / Recurrence relation / Correlation attack / Cryptography / Mathematics / Pseudorandom number generators

On the Multi-output Filtering Model and Its Applications Guang Gong, Kalikinkar Mandal, Yin Tan and Teng Wu Department of Electrical and Computer Engineering University of Waterloo, Canada {ggong,kmandal,y24tan,teng.wu}@

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2014-07-14 12:04:50
64Sybil attack / Denial-of-service attack / Adversary model / Adversary / Scalability / Electronic voting / System software / Distributed computing / Computing / LOCKSS / Peer-to-peer

1 Impeding Attrition Attacks in P2P Systems Petros Maniatis TJ Giuli

Add to Reading List

Source URL: lockss.org

Language: English - Date: 2011-01-02 18:55:49
65Computing / Application security / Attack surface / Threat model / Vulnerability / Secure coding / Fuzz testing / Computer security / Cyberwarfare / Software testing

presented by Hardening the UEFI Attack Surface Updated[removed]

Add to Reading List

Source URL: www.uefi.org

Language: English - Date: 2013-09-24 15:13:25
66Electronic commerce / Secure communication / Cryptographic protocols / Certificate authority / Public key certificate / HTTP Secure / Revocation list / Man-in-the-middle attack / Computer security / Cryptography / Public-key cryptography / Key management

Abstract - Evaluating certificate trust model enhancements for HTTPS

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-03-12 12:39:19
67MIG /  Inc. / Economic impact analysis / September 11 attacks / Los Angeles / Input-output model / Infrastructure / Science / Economics / Geography of California / Port

DRAFT Report #[removed]THE ECONOMIC IMPACT OF A TERRORIST ATTACK ON THE TWIN PORTS OF LOS

Add to Reading List

Source URL: www.usc.edu

Language: English - Date: 2008-05-28 06:16:31
68Pinus palustris / Fuel model / National Fire Danger Rating System / Campfire / Controlled burn / Slash / Fire / Wildfires / Flora of the United States

Beaverhead-Deerlodge National Forest INITIAL ATTACK REPORT ON CONDITIONS CONFIRMED LEGAL: TWN:

Add to Reading List

Source URL: gacc.nifc.gov

Language: English - Date: 2014-07-15 17:58:51
69Denial-of-service attacks / Security / Spamming / Computer worms / Operations security / Adversary model / Denial-of-service attack / Vulnerability / Email spam / Cyberwarfare / Computer security / Computer network security

Notes On The Design Of An Internet Adversary David S. H. Rosenthal1 , Petros Maniatis2 , Mema Roussopoulos3 , TJ Giuli4 , and Mary Baker5 1 4

Add to Reading List

Source URL: lockss.org

Language: English - Date: 2011-05-12 16:55:10
70Dynamics / Airfoil / Lift / Angle of attack / Model rocket / Foil / Camber / Rocket / Friction / Aerodynamics / Aerospace engineering / Fluid dynamics

CALIFORNIA STATE SCIENCE FAIR 2002 PROJECT SUMMARY Name(s) Sarah M. Balbi

Add to Reading List

Source URL: www.usc.edu

Language: English - Date: 2002-05-07 23:32:56
UPDATE