11![](https://www.pdfsearch.io/img/d80648f90bb39c8663cf52e94701e9fa.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2015-04-09 11:38:04
|
---|
12![2014 IEEE Security and Privacy Workshops Understanding Insider Threat: A Framework for Characterising Attacks Jason R.C. Nurse† , Oliver Buckley† , Philip A. Legg† , Michael Goldsmith† , Sadie Creese† , Gordon 2014 IEEE Security and Privacy Workshops Understanding Insider Threat: A Framework for Characterising Attacks Jason R.C. Nurse† , Oliver Buckley† , Philip A. Legg† , Michael Goldsmith† , Sadie Creese† , Gordon](https://www.pdfsearch.io/img/d7186ff332e3bd7544253c8c47dd50c0.jpg) | Add to Reading ListSource URL: www.cs.ox.ac.ukLanguage: English - Date: 2015-03-18 10:54:32
|
---|
13![Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TRSeptember 24, 2009 Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TRSeptember 24, 2009](https://www.pdfsearch.io/img/00bd46cd44a4d602ccd3dbfcc580b2ae.jpg) | Add to Reading ListSource URL: dspace.mit.eduLanguage: English - Date: 2009-09-29 02:01:46
|
---|
14![SESSION ID: ANF-F03 Achieving Defendable Architectures via Threat-Driven Methodologies Michael Muckin SESSION ID: ANF-F03 Achieving Defendable Architectures via Threat-Driven Methodologies Michael Muckin](https://www.pdfsearch.io/img/4a38842dc8256f6772d8f38a36c2bd27.jpg) | Add to Reading ListSource URL: www.rsaconference.comLanguage: English - Date: 2015-04-28 14:34:47
|
---|
15![Sybil-resistant DHT routing George Danezis1 , Chris Lesniewski-Laas2, M. Frans Kaashoek2 , and Ross Anderson1 1 2 Sybil-resistant DHT routing George Danezis1 , Chris Lesniewski-Laas2, M. Frans Kaashoek2 , and Ross Anderson1 1 2](https://www.pdfsearch.io/img/8bee2889af8afbe9854f6995bddd477e.jpg) | Add to Reading ListSource URL: pdos.csail.mit.eduLanguage: English - Date: 2015-04-29 10:31:16
|
---|
16![Attribute Decoration of Attack–Defense Trees Alessandra Bagnato1 , Barbara Kordy2 , Per Håkon Meland3 , Patrick Schweitzer2 1 TXT e-solutions Attribute Decoration of Attack–Defense Trees Alessandra Bagnato1 , Barbara Kordy2 , Per Håkon Meland3 , Patrick Schweitzer2 1 TXT e-solutions](https://www.pdfsearch.io/img/debc7716afa8bc29b352d95414e5b8fc.jpg) | Add to Reading ListSource URL: satoss.uni.luLanguage: English - Date: 2014-09-17 09:23:54
|
---|
17![Analyzing the Security in the GSM Radio Network using Attack Jungles Parosh Aziz Abdulla1 , Jonathan Cederberg1 , and Lisa Kaati2? 1 University of Uppsala, Sweden, email: {parosh, jonathan.cederberg}@it.uu.se Analyzing the Security in the GSM Radio Network using Attack Jungles Parosh Aziz Abdulla1 , Jonathan Cederberg1 , and Lisa Kaati2? 1 University of Uppsala, Sweden, email: {parosh, jonathan.cederberg}@it.uu.se](https://www.pdfsearch.io/img/620ea1c7ebdee3befcf6a48af7881d0a.jpg) | Add to Reading ListSource URL: user.it.uu.seLanguage: English - Date: 2011-10-12 02:21:46
|
---|
18![Determining the Probability of Smart Grid Attacks by ∗ Combining Attack Tree and Attack Graph Analysis Kristian Beckers1 , Maritta Heisel1 , Leanid Krautsevich2 , Fabio Martinelli2 , Rene Meis1 , and Artsiom Yautsiukhi Determining the Probability of Smart Grid Attacks by ∗ Combining Attack Tree and Attack Graph Analysis Kristian Beckers1 , Maritta Heisel1 , Leanid Krautsevich2 , Fabio Martinelli2 , Rene Meis1 , and Artsiom Yautsiukhi](https://www.pdfsearch.io/img/aa987246ca4de5ae6f65bcb10e87ad31.jpg) | Add to Reading ListSource URL: wwwold.iit.cnr.itLanguage: English - Date: 2015-04-02 07:11:50
|
---|
19![LeastLeast-toxic Control of Elm Leaf Beetles Elm leaf beetles attack all species of elm, but prefer English and American Elms. These beetles feed on tree leaves, mainly causing aesthetic damage. However, this does stress LeastLeast-toxic Control of Elm Leaf Beetles Elm leaf beetles attack all species of elm, but prefer English and American Elms. These beetles feed on tree leaves, mainly causing aesthetic damage. However, this does stress](https://www.pdfsearch.io/img/b5835828f909fcd921b31194a45f3168.jpg) | Add to Reading ListSource URL: www.beyondpesticides.orgLanguage: English - Date: 2012-09-07 11:04:53
|
---|
20![Attacks at the Data Link Layer By GUILLERMO MARIO MARRO Electronic Engineer (Universidad Nacional de Rosario[removed]THESIS Submitted in partial satisfaction of the requirements for the degree of Attacks at the Data Link Layer By GUILLERMO MARIO MARRO Electronic Engineer (Universidad Nacional de Rosario[removed]THESIS Submitted in partial satisfaction of the requirements for the degree of](https://www.pdfsearch.io/img/4f7b0774163eeec7b3a31c76e1f02f09.jpg) | Add to Reading ListSource URL: seclab.cs.ucdavis.eduLanguage: English - Date: 2004-06-21 18:50:00
|
---|