Attack!

Results: 9771



#Item
401Cyberwarfare / Denial-of-service attacks / Computing / Internet activism / Cyberspace / Denial-of-service attack / Botnet / CloudFlare / Application layer DDoS attack / Prolexic Technologies

8424D_COGECO_Bus_Units_Logos_Spot

Add to Reading List

Source URL: www.cogecopeer1.com

Language: English - Date: 2016-07-20 15:41:15
402Automatic identification and data capture / Ubiquitous computing / Privacy / Radio-frequency identification / Wireless / Humancomputer interaction / Institute for Applied Information Processing and Communications / Computing

Internet of Things Devices Under Attack Advisor(s): Hannes Groß Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
403Computing / Network architecture / Internet / Routing protocols / Routing / Computer networking / Internet Standards / Internet protocols / Border Gateway Protocol / Router / Route flapping / Route reflector

Losing Control of the Internet: Using the Data Plane to Attack the Control Plane Max Schuchard University of Minnesota schuch @ cs.umn.edu

Add to Reading List

Source URL: randombits.io

Language: English - Date: 2015-06-29 10:17:03
404Islam / Palestinian terrorism / Palestinian militant groups / Politics / Hamas / Islam and antisemitism / Islamic fundamentalism / Jihad / Suicide attack / Islamism / Kidnapping and murder of Israeli teenagers / Muhammad Sawalha

Islamist Mustafa Abu Sway Lectures to Christian Students on PASSAGES ISRAEL Tour Professor of Philosophy and Islamic Studies

Add to Reading List

Source URL: www.lc.org

Language: English - Date: 2016-07-25 10:52:07
405Cryptography / Applied mathematics / Differential cryptanalysis / Block cipher / Cryptanalysis / Linear cryptanalysis / Data Encryption Standard / Advanced Encryption Standard / Rebound attack / LOKI

Zero-Correlation and Impossible Differential Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
406Hillary Clinton / United States / Presidency of Barack Obama / Benghazi attack / LibyaUnited States relations / Kevin McCarthy / Leon Panetta / United States House Select Committee on Benghazi / Adam Schiff / Central Intelligence Agency

HONORING COURAGE, IMPROVING SECURITY, AND FIGHTING THE EXPLOITATION OF A TRAGEDY Report of the Democratic Members June 2016

Add to Reading List

Source URL: democrats-benghazi.house.gov

Language: English - Date: 2016-06-27 17:44:51
407Florida / Florida Department of Law Enforcement / Orlando nightclub shooting / United States / Grief / Florida Public Safety Information Act

GOV. SCOTT- FDLE AND DCF PROVIDING FUNDS TO HELP WITH ORLANDO TERROR ATTACK On June 15, 2016, in News Releases, by Staff ORLANDO, Fla. – Today, Governor Rick Scott announced that FDLE has set aside more than $520,000 i

Add to Reading List

Source URL: www.floridadisaster.org

Language: English - Date: 2016-06-15 17:14:57
408Community / Collaboration / Pedagogy

Community Collaborative Assessment – A Diagnostic of Success Readiness It looks like the countdown has begun. You have identified your community’s most pressing issue, gathered a group eager to attack it, and now you

Add to Reading List

Source URL: www.collaborationforimpact.com

Language: English - Date: 2014-02-24 19:08:51
409Cryptography / Block cipher / Probabilistic encryption / Semantic security / RSA / Advantage / Feistel cipher / Malleability / Chosen-plaintext attack / Ciphertext / Cryptosystem / Data Encryption Standard

A Formal Treatment of Remotely Keyed Encryption? Matt Blaze1 Joan Feigenbaum1 Moni Naor2 AT&T Labs { Research 180 Park Avenue Florham Park, NJUSA

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2001-10-24 10:54:04
410Computer network security / Security / Cyberwarfare / Finance / Spoofing attack / Spoofing / Spoof / Computer security / Speech synthesis / Biometrics / Robust random early detection / Speech technology

ASVspoof 2015: the First Automatic Speaker Verification Spoofing and Countermeasures Challenge Zhizheng Wu1 Tomi Kinnunen2 Nicholas Evans3 Junichi Yamagishi1

Add to Reading List

Source URL: www.cstr.inf.ed.ac.uk

Language: English - Date: 2015-09-29 11:06:25
UPDATE