Attack!

Results: 9771



#Item
391Computing / Recommender systems / Economy / Cyberspace / Spamming / Robust collaborative filtering / Email spam / Markov chain / Collaborative filtering / Spam / Bipartite graph / Naive Bayes spam filtering

Catch the Black Sheep: Unified Framework for Shilling Attack Detection Based on Fraudulent Action Propagation

Add to Reading List

Source URL: yongfeng.me

Language: English - Date: 2015-12-28 22:49:42
392Security / Cybercrime / Cyberwarfare / Military science / Computing / Hacking / Military technology / National security / International Multilateral Partnership Against Cyber Threats / Computer security / Cyberterrorism / Cyber-attack

UNIDIR Cyber Stability Seminar 2015: Regime Coherence UNIDIR RESOURCES

Add to Reading List

Source URL: www.unidir.org

Language: English - Date: 2015-09-18 04:25:35
393Bitcoin / Financial technology / E-commerce / Economy / LocalBitcoins / Denial-of-service attack / Draft:Basics with Bitcoin / Legality of bitcoin by country

PLEASE FORWARD THIS EMAIL TO SOMEONE IN YOUR COMPANY WHO IS ALLOWED TO MAKE IMPORTANT DECISIONS! We are the Kadyrovtsy and we have chosen your company as target for our next DDoS attack. All of your servers will be subje

Add to Reading List

Source URL: www.link11.de

Language: English - Date: 2016-06-02 05:34:32
394Health care / Health / Medicine / Nursing / National Health Service / Triage / NHS Scotland / Political riots

Greek_JulAug:14 PM Page 14 Under Attack Greek medical workers face incredible odds to save their national healthcare s

Add to Reading List

Source URL: kiamistilis.com

Language: English - Date: 2013-04-05 14:58:46
395Cryptography / NIST hash function competition / Cryptographic hash functions / SHA-3 / Side-channel attack / Power analysis / Crypt

Side-Channel Analysis of an Authenticated Encryption Algorithm Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
396Security / Prevention / Computer security / Safety / Crime prevention / National security / Computer network security / Cryptography / Vulnerability / Information security / San Jose State University / Attack

PDF Document

Add to Reading List

Source URL: its.sjsu.edu

Language: English - Date: 2015-12-07 11:37:38
397Aerodynamics / Aerospace engineering / Aeronautics / Fluid dynamics / Drag / Angle of attack / Lift / Flight / Wing / Gliding flight

Answers & commentary for SHV/FSVL theory exam for paragliders Part 1: Aerodynamics and Flight Mechanics. (2nd ed © J. Oberson, English Translation 2010 © A. Piers AERODYNAMICS AND FLIGHT MECHANICS 2nd edition 20

Add to Reading List

Source URL: www.soaringmeteo.ch

Language: English - Date: 2012-04-19 17:23:47
398Electronic countermeasures / Electronics / Technology / Military communications / Denial-of-service attacks / Electronic counter-countermeasure / Military technology / Denial-of-service attack / Spread spectrum / Transmission Control Protocol / Radar jamming and deception / Draft:Energy related security attacks

STIR-ing the Wireless Medium with Self-Tuned, Inference-Based, Real-Time Jamming Bruce DeBruhl, Yu Seung Kim, Zachary Weinberg, Patrick Tague Carnegie Mellon University Electrical and Computer Engineering {debruhl, yuseu

Add to Reading List

Source URL: research.owlfolio.org

Language: English - Date: 2016-04-20 11:44:16
399Security / Prevention / Safety / National security / Computer security / Cybercrime / Cyberwarfare / Cryptography / Denial-of-service attack / Information security

Corero Network Security plc Corero Network Security plc 169 High Street Rickmansworth Hertfordshire WD3 1AY

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2012-04-10 09:15:59
400Security / Cyberwarfare / Prevention / Cybercrime / National security / Hacking / Military technology / Stuxnet / Cyber-attack / Computer security / Sabotage / Espionage

OPINION End this phony cyberwar Talk of combat in the fifth domain has become a fixture in Washington. But cyberwar has never happened and probably never will, says Thomas Rid EXACTLY two decades ago, the

Add to Reading List

Source URL: ridt.co

Language: English - Date: 2015-12-18 07:31:22
UPDATE