Attack!

Results: 9771



#Item
811

Linear Iterations on Ordered Semirings for Trust Metric Computation and Attack Resiliency Evaluation George Theodorakopoulos and John S. Baras Institute for System Research Department of Electrical and Computer Engineeri

Add to Reading List

Source URL: users.cs.cf.ac.uk

Language: English - Date: 2012-09-20 10:47:09
    812

    Scotus Rides Again By Dennis Howard The Supreme Court decision in the same sex marriage case (Obergefell v. Hodges) represents the most serious attack on states’ rights and the democratic process since Roe v. Wade reve

    Add to Reading List

    Source URL: www.movementforabetteramerica.org

    Language: English - Date: 2016-01-27 14:32:38
      813

      CHI 2010: Monsters Attack! April 10–15, 2010, Atlanta, GA, USA Early Explorations of CAT: Canine Amusement and Training

      Add to Reading List

      Source URL: www.eecs.ucf.edu

      Language: English - Date: 2010-04-20 15:41:09
        814

        A Faster and More Realistic Flush+Reload Attack on AES ˙ Berk G¨ ulmezo˘ glu, Mehmet Sinan Inci,

        Add to Reading List

        Source URL: users.wpi.edu

        Language: English - Date: 2015-03-04 17:11:42
          815Cryptography / Stream ciphers / Pseudorandom number generators / Linear-feedback shift register / Correlation attack / Self-shrinking generator / Grain / QUAD / Turing / Shrinking generator / Shift register

          Decim, a new stream cipher for hardware applications ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T.

          Add to Reading List

          Source URL: www.rocq.inria.fr

          Language: English - Date: 2006-03-23 04:05:33
          816Cyberwarfare / Computer network security / Denial-of-service attacks / Computer networking / Named data networking / Interest Flooding Attack / Denial-of-service attack / Forwarding plane / Computer network / Computer security

          Revisiting Countermeasures Against NDN Interest Flooding Samir Al-Sheikh Matthias Wählisch

          Add to Reading List

          Source URL: conferences2.sigcomm.org

          Language: English - Date: 2015-10-01 13:27:13
          817

          The High-School Profiling Attack: How Online Privacy Laws Can Actually Increase Minors’ Risk Ratan Dey, Yuan Ding, Keith W Ross Polytechnic Institute of New York University, Brooklyn, New York ,dingyu

          Add to Reading List

          Source URL: www.petsymposium.org

          Language: English - Date: 2013-06-10 12:18:23
            818

            February 20, 2014 ATC Unveils Two-Year Roadmap to Attack Top Tech Priorities, Calls on Market to “Think Bigger” Eight New Board Members and Common Vision Put Tech

            Add to Reading List

            Source URL: skylesbayne.com

            Language: English - Date: 2015-11-17 12:32:40
              819

              Securing Anonymous Communication Channels under the Selective DoS Attack Anupam Das and Nikita Borisov University of Illinois at Urbana Champaign, USA {das17,nikita}@illinois.edu Abstract. Anonymous communication systems

              Add to Reading List

              Source URL: fc13.ifca.ai

              Language: English - Date: 2013-03-27 20:42:00
                820

                APRILISSUE #9 UKRAINE UNDER ATTACK NEWSLETTER ON RUSSIAN OCCUPATION OF CRIMEA

                Add to Reading List

                Source URL: www.scotlandrussiaforum.org

                Language: English - Date: 2016-03-04 13:30:10
                  UPDATE