Attack!

Results: 9771



#Item
261Computer network security / Computing / Security / Cyberwarfare / Bluetooth / Wireless / Medical device / Computer security / Man-in-the-middle attack / Bluesnarfing / Mobile security

Securing Legacy Mobile Medical Devices Vahab Pournaghshband, Majid Sarrafzadeh, and Peter Reiher Computer Science Department University of California, Los Angeles {vahab,majid,reiher}@cs.ucla.edu

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2012-09-17 16:56:34
262Computing / Network performance / Network architecture / Internet / Teletraffic / Cyberwarfare / Internet protocols / Transmission Control Protocol / Quality of service / Denial-of-service attack / Voice over IP / Traffic shaping

Towards User-Centric Metrics for Denial-Of-Service Measurement Jelena Mirkovic Alefiya Hussain University of Delaware SPARTA, Inc. Peter Reiher

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2015-06-05 18:13:26
263Geography of New York / Metro Detroit / Rochester /  New York / Rochester /  Michigan / Cameron / Avon / Geography of the United States

ALEXANDER CAMERON Alexander Cameron, well known Rochester businessman and wholesale milk dealer, died suddenly at the Harper Hospital last Sunday following a heart attack. Mr. Cameron had been a resident of Rochester for

Add to Reading List

Source URL: rochesteravonhistoricalsociety.org

Language: English - Date: 2014-01-22 14:37:24
264Security / Computing / Cyberwarfare / Computer security / Computer network security / Cryptography / National security / Denial-of-service attack / Threat / Critical infrastructure protection / Internet / Vulnerability

An ideal Internet Early Warning System Dominique Petersen and Norbert Pohlmann Institute for Internet Security University of Applied Sciences Gelsenkirchen {petersen, pohlmann}@internet-sicherheit.de Abstract

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 12:57:45
265Health / Health informatics / Medicine / Health information exchange / Medical privacy / Electronic health record / Health information technology / Public health

Health Information Technology (Iowa e-Health) Phone: www.IowaeHealth.org Imagine experiencing a heart attack hours away from home. The emergency room needs your vital health information fast.

Add to Reading List

Source URL: idph.iowa.gov

Language: English - Date: 2016-07-27 09:46:30
266Computing / Routing algorithms / Cyberwarfare / Concurrent computing / Denial-of-service attack / Denial-of-service attacks / Internet Relay Chat / Computer network / Multipath routing / Botnet / Routing / Crowds

On the Interplay of Link-Flooding Attacks and Traffic Engineering Dimitrios Gkounis1 , Vasileios Kotronis2 , Christos Liaskos3 , Xenofontas Dimitropoulos3∗ 1 NEC 2 ETH Zurich, Switzerland

Add to Reading List

Source URL: inspire.edu.gr

Language: English - Date: 2016-04-22 11:14:02
267Software / Computer security / Prevention / Computer access control / Password / Security / Login / Expect / Semantic URL attack / Password policy

Journey TM College Student Registration Instructions Student Name: .

Add to Reading List

Source URL: www.irsc.edu

Language: English - Date: 2016-01-12 09:58:01
268Computer worms / Cyberwarfare / Cybercrime / Computer security

EN1.17 Visualization Support for Intrusion Detection and Forensics Joseph Chang It is of great interest to law enforcement and security personnel to discover the source of a worm attack in order to combat the threat and

Add to Reading List

Source URL: aao.sinica.edu.tw

Language: English - Date: 2014-10-02 04:23:39
269Security / Computing / Computer security / Cyberwarfare / Cybercrime / National security / E-commerce / Cyber-attack / Cyberwarfare in the United States

SPECIAL FEATURE JULY 2O16 VOLUME 19 / ISSUE 2 System-Aware Cyber

Add to Reading List

Source URL: www.acq.osd.mil

Language: English - Date: 2016-08-02 11:17:13
270Malware / Marketing / Computer security / Adware / Advertising / Deception / Internet marketing / Malvertising / Online advertising / Trustwave Holdings

WHAT IS MALVERTISING? Malicious advertising (Malvertising) is a malware attack that uses online ads to spread malicious code HOW MALVERTISNG WORKS You visit a website with an infected banner

Add to Reading List

Source URL: nl.malwarebytes.com

Language: English - Date: 2016-05-10 22:53:50
UPDATE