Attack!

Results: 9771



#Item
281C:/Users/beck/Desktop/CSET CONFERENCE 2010/USENIX template/4_11_DRAFT2/jayaram_drmiller changes/FINAL_SUBMISSION_AFTER REVIEW/CSET_submission.dvi

C:/Users/beck/Desktop/CSET CONFERENCE 2010/USENIX template/4_11_DRAFT2/jayaram_drmiller changes/FINAL_SUBMISSION_AFTER REVIEW/CSET_submission.dvi

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-07-08 13:42:23
282Cyber Resiliency Engineering Aid - Cyber Resiliency Techniques

Cyber Resiliency Engineering Aid - Cyber Resiliency Techniques

Add to Reading List

Source URL: www.defenseinnovationmarketplace.mil

Language: English - Date: 2015-10-09 09:54:58
283

PDF Document

Add to Reading List

Source URL: www.californiacapitalairshow.com

Language: English - Date: 2015-08-07 17:45:31
284GlobecomCommunication and Information System Security Symposium  Probabilistic Key Distribution in Vehicular Networks with Infrastructure Support Jo˜ao Almeida∗ , Saurabh Shintre∗† , Mate Boban∗† , and

GlobecomCommunication and Information System Security Symposium Probabilistic Key Distribution in Vehicular Networks with Infrastructure Support Jo˜ao Almeida∗ , Saurabh Shintre∗† , Mate Boban∗† , and

Add to Reading List

Source URL: mateboban.net

Language: English - Date: 2013-07-15 15:54:45
285Solution Brief: Top 6 Security Use Cases for Automated Asset Inventory  SOLUTION BRIEF TOP 6 SECURITY USE CASES

Solution Brief: Top 6 Security Use Cases for Automated Asset Inventory SOLUTION BRIEF TOP 6 SECURITY USE CASES

Add to Reading List

Source URL: www.qualys.com

Language: English - Date: 2016-01-15 14:54:13
286The Localizer Newsletter of the Aviation Program VOLUME 1, ISSUE 1  APRIL 2009

The Localizer Newsletter of the Aviation Program VOLUME 1, ISSUE 1 APRIL 2009

Add to Reading List

Source URL: ed.mnsu.edu

Language: English - Date: 2011-02-16 18:11:12
287A Data-Centric Approach to Insider Attack Detection in Database Systems Sunu Mathew1, , Michalis Petropoulos2, Hung Q. Ngo2 , and Shambhu Upadhyaya2 1

A Data-Centric Approach to Insider Attack Detection in Database Systems Sunu Mathew1, , Michalis Petropoulos2, Hung Q. Ngo2 , and Shambhu Upadhyaya2 1

Add to Reading List

Source URL: www.cse.buffalo.edu

Language: English - Date: 2010-07-20 10:35:48
288Microsoft Word - A327 Enforcing Nuclear Disarmament _2005_

Microsoft Word - A327 Enforcing Nuclear Disarmament _2005_

Add to Reading List

Source URL: www2.gwu.edu

Language: English - Date: 2009-07-22 14:34:26
289An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-08-20 03:23:28