Attack model

Results: 101



#Item
71Human communication / Question / Learning / Behavior / Linguistics / Education / CNN-YouTube presidential debates / Meta-model / Reading / Data collection / Grammar

A Discussion Guide to AMERICA IS UNDER ATTACK September 11, 2011: The Day the Towers Fell By Don Brown Grade Range: 1 to 5, Age Range: 6 to 10 ISBN: [removed]

Add to Reading List

Source URL: media.us.macmillan.com

Language: English - Date: 2011-07-28 21:00:47
72Input-output model / Airline / September 11 attacks / Man-portable air-defense systems / Science / Academia / Regional science / Economics / MIG /  Inc.

DRAFT Report #[removed]The Economic Impacts of a Terrorist Attack on the U.S. Commercial Aviation System

Add to Reading List

Source URL: www.usc.edu

Language: English - Date: 2008-05-28 06:17:00
73Computer security / Crime prevention / National security / Hacking / Attack patterns / Penetration test / Application security / Threat model / Security engineering / Security / Software testing / Cyberwarfare

The Balance of Secure Development and Secure Operations in the Software Security Equation Sean Barnum The MITRE Corporation

Add to Reading List

Source URL: cybox.mitre.org

Language: English - Date: 2011-10-27 15:29:15
74Fluid dynamics / Stall / Control theory / Gliding flight / Elevator / Angle of attack / Drag / Glider / Model aircraft / Aerospace engineering / Aerodynamics / Aviation

Experiments in Fixed-Wing UAV Perching Rick Cory∗ and Russ Tedrake† MIT Computer Science and Artificial Intelligence Lab, Cambridge, MA, 02139, USA High-precision maneuvers at high angles-of-attack are not properly a

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2008-08-19 23:12:52
75Computing / Tennessee Valley Authority / Unidirectional network / Diode / Zero-day attack / Vulnerability / OSI model / Computer network security / Cyberwarfare / Computer security

Tennessee Valley Authority’s (TVA) Data Diode Program ICSJWG Spring Conference May 8 9, 2012

Add to Reading List

Source URL: www.owlcti.com

Language: English - Date: 2013-09-26 13:41:12
76Security / Vulnerability / IT risk management / Attack tree / CVSS / Threat model / Attack / Application security / Exploit / Computer security / Computer network security / Cyberwarfare

Microsoft Word - Chen-ValueDrivenSecurity.Final.Revised.doc

Add to Reading List

Source URL: weis2007.econinfosec.org

Language: English - Date: 2007-05-09 22:41:00
77Denial-of-service attacks / Computer networking / Internet / Network performance / Denial-of-service attack / Reverse proxy / Firewall / LOIC / Intrusion detection system / Computer network security / Computing / Cyberwarfare

Mitigating DoS Attacks using Performance Model-driven Adaptive Algorithms CORNEL BARNA, MARK SHTERN, MICHAEL SMIT, VASSILIOS TZERPOS, MARIN LITOIU, York University Denial of Service (DoS) attacks overwhelm online servic

Add to Reading List

Source URL: www.savinetwork.ca

Language: English - Date: 2013-10-15 15:14:36
78Ground-attack aircraft / Curtiss Model F / Military aircraft designation systems / Naval Air Station Squantum / United States Navy aircraft designation system / Aviation / Aircraft / Attack aircraft

UNITED STATES NAVAL AVIATION 1910–1995 APPENDIX 451

Add to Reading List

Source URL: www.history.navy.mil

Language: English - Date: 2000-11-22 00:00:00
79Advantage / Cipher / RSA / Random oracle / Probabilistic encryption / Plaintext-aware encryption / Cryptography / Ciphertext indistinguishability / Chosen-plaintext attack

Sample or Random Security – A Security Model for Segment-Based Visual Cryptography Sebastian Pape Department of Computer Science, Technical University Dortmund, Research Group: Software Engineering for Critical Systems

Add to Reading List

Source URL: fc14.ifca.ai

Language: English - Date: 2014-02-15 11:15:30
80Internet standards / Key management / Cryptographic protocols / Network Time Protocol / Time server / Public-key cryptography / Man-in-the-middle attack / Key / One-time password / Cryptography / Computing / Internet protocols

Cryptographic Authentication for Real-Time Network Protocols1,2 David L. Mills3 Abstract This paper describes a new security model and authentication scheme for distributed, real-time network protocols used in time synch

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 1998-12-02 17:00:16
UPDATE