Attack!

Results: 9771



#Item
761Cyberwarfare / Internet / Denial-of-service attacks / Computing / Internet security / Cyberspace / Internet Relay Chat / Denial-of-service attack / Incapsula / Bitcoin / Mt. Gox / Cloudflare

Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem Marie Vasek, Micah Thornton, and Tyler Moore Computer Science and Engineering Department Southern Methodist University, Dallas, TX Email: {mvasek,m

Add to Reading List

Source URL: fc14.ifca.ai

Language: English - Date: 2014-02-18 12:20:22
762

SkyNET: a 3G-enabled mobile attack drone and stealth botmaster Theodore Reed Stevens Institute of Technology Joseph Geis Stevens Institute of Technology

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-06-24 15:39:05
    763

    ISSUE #18 MAY 2014 UKRAINE UNDER ATTACK

    Add to Reading List

    Source URL: www.scotlandrussiaforum.org

    Language: English - Date: 2016-03-04 13:30:10
      764Domain name system / Internet / Internationalized domain name / Top-level domains / Unicode blocks / Tilde / .org / IDN homograph attack / Country code top-level domain

      .tel Portuguese Language IDN Policy March 2015 .tel Portuguese Language IDN Policy March 2015

      Add to Reading List

      Source URL: d21po8gip7hnk5.cloudfront.net

      Language: English - Date: 2015-06-24 16:01:42
      765

      Offline bruteforce attack on WiFi Protected Setup Dominique Bongard Founder 0xcite, Switzerland @reversity

      Add to Reading List

      Source URL: archive.hack.lu

      Language: English - Date: 2014-10-27 15:37:06
        766

        Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques Rahul Potharaju, Andrew Newell, Cristina Nita-Rotaru, Xiangyu Zhang Department of Computer Science, Purdue University, IN, USA {rpothara, new

        Add to Reading List

        Source URL: homes.cerias.purdue.edu

        Language: English - Date: 2012-11-04 21:39:43
          767

          Int J Primatol DOIs10764Risky Business? Lethal Attack by a Jaguar Sheds Light on the Costs of Predator Mobbing for Capuchins (Cebus capucinus)

          Add to Reading List

          Source URL: crofoot.ucdavis.edu

          Language: English - Date: 2015-06-12 21:15:50
            768Domain name system / Internet / Top-level domains / Internationalized domain names / Country code top-level domains / .org / IDN homograph attack / .

            .tel Swedish Language IDN Policy March 2015 .tel Swedish Language IDN Policy March 2015

            Add to Reading List

            Source URL: d21po8gip7hnk5.cloudfront.net

            Language: English - Date: 2015-06-24 16:02:01
            769Computing / Cyberwarfare / Botnets / Computer network security / Multi-agent systems / Spamming / Concurrent computing / Domain generation algorithm / Malware / Sality / Denial-of-service attack / Computer virus

            AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis Zhaoyan Xu Antonio Nappa

            Add to Reading List

            Source URL: faculty.cs.tamu.edu

            Language: English - Date: 2014-09-29 02:03:52
            770Cryptography / Ciphertext indistinguishability / Semantic security / Chosen-ciphertext attack / Block cipher / Encryption / Feistel cipher / RSA / Ciphertext / Chosen-plaintext attack / Cipher / Advantage

            On Symmetric Encryption with Distinguishable Decryption Failures* Alexandra Boldyreva1 , Jean Paul Degabriele2 , Kenneth G. Paterson2 , and Martijn Stam3 2 1 Georgia Institute of Technology

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2014-06-25 11:49:37
            UPDATE