Attack!

Results: 9771



#Item
851Towards Synthesis of Platform-aware Attack-Resilient Control Systems ∗ Extended Abstract Miroslav Pajic1

Towards Synthesis of Platform-aware Attack-Resilient Control Systems ∗ Extended Abstract Miroslav Pajic1

Add to Reading List

Source URL: www.georgejpappas.org

Language: English - Date: 2013-05-22 16:56:10
852Attack on Broadcast RC4 Revisited Subhamoy Maitra1 , Goutam Paul2 , and Sourav Sen Gupta1 1 2

Attack on Broadcast RC4 Revisited Subhamoy Maitra1 , Goutam Paul2 , and Sourav Sen Gupta1 1 2

Add to Reading List

Source URL: www.souravsengupta.com

Language: English - Date: 2014-03-16 03:17:27
    853Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack Sheila Becker1 , Jeff Seibert2 , Cristina Nita-Rotaru2 , and Radu State1 1  University of Luxembourg - SnT, L-1359 Luxembourg

    Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack Sheila Becker1 , Jeff Seibert2 , Cristina Nita-Rotaru2 , and Radu State1 1 University of Luxembourg - SnT, L-1359 Luxembourg

    Add to Reading List

    Source URL: homes.cerias.purdue.edu

    Language: English - Date: 2012-11-05 10:20:43
      854A Dynamic Model of Traffic on the Web for Analyzing Network Response to Attack John Tomlin IBM Almaden Reseach Center

      A Dynamic Model of Traffic on the Web for Analyzing Network Response to Attack John Tomlin IBM Almaden Reseach Center

      Add to Reading List

      Source URL: www-users.cs.umn.edu

      Language: English - Date: 2004-05-14 13:40:03
        855Parashat Ekev Rabbi Adam Rubin 5775 For those who follow events in Israel, the last week and a half have been horrible, absolutely heartbreaking. First was an attack last Thursday on

        Parashat Ekev Rabbi Adam Rubin 5775 For those who follow events in Israel, the last week and a half have been horrible, absolutely heartbreaking. First was an attack last Thursday on

        Add to Reading List

        Source URL: bethshalomseattle.org

        Language: English - Date: 2015-08-20 19:36:46
          856Two for One: Microsoft Office Encapsulated PostScript and Windows Privilege Escalation Zero-Days FireEye recently uncovered an attack exploiting two previously unknown vulnerabilities, one in Microsoft Office (CVE

          Two for One: Microsoft Office Encapsulated PostScript and Windows Privilege Escalation Zero-Days FireEye recently uncovered an attack exploiting two previously unknown vulnerabilities, one in Microsoft Office (CVE

          Add to Reading List

          Source URL: www.fireeye.com

          Language: English - Date: 2015-09-08 16:29:39
            857Media Release, November 19, 2014  Contacts: Beryl Anderson, , cell,  Communications Manager at Save Mount Diablo  Pearl Harbor Day Beacon Lighting Ceremony Moved

            Media Release, November 19, 2014 Contacts: Beryl Anderson, , cell, Communications Manager at Save Mount Diablo Pearl Harbor Day Beacon Lighting Ceremony Moved

            Add to Reading List

            Source URL: www.savemountdiablo.org

            Language: English - Date: 2014-11-24 20:40:57
            858.tel Hungarian Language IDN Policy March 2015 .tel Hungarian Language IDN Policy March 2015

            .tel Hungarian Language IDN Policy March 2015 .tel Hungarian Language IDN Policy March 2015

            Add to Reading List

            Source URL: d21po8gip7hnk5.cloudfront.net

            Language: English - Date: 2015-06-24 16:01:38
            859S$A: A Shared Cache Attack that Works Across Cores and Defies VM Sandboxing—and its Application to AES Gorka Irazoqui Thomas Eisenbarth

            S$A: A Shared Cache Attack that Works Across Cores and Defies VM Sandboxing—and its Application to AES Gorka Irazoqui Thomas Eisenbarth

            Add to Reading List

            Source URL: users.wpi.edu

            Language: English - Date: 2015-03-22 15:11:55
              860(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version) Shuang Wu1 , Dengguo Feng1 , Wenling Wu1 , Jian Guo2 , Le Dong1 , and Jian Zou1 1  State Key Laboratory of Information Securit

              (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version) Shuang Wu1 , Dengguo Feng1 , Wenling Wu1 , Jian Guo2 , Le Dong1 , and Jian Zou1 1 State Key Laboratory of Information Securit

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2012-09-10 00:05:29