Attack!

Results: 9771



#Item
901Attack Plan Recognition and Prediction Using Causal Networks Xinzhou Qin and Wenke Lee Georgia Institute of Technology Atlanta, GA 30332, U.S.A. {xinzhou, wenke}@cc.gatech.edu Abstract

Attack Plan Recognition and Prediction Using Causal Networks Xinzhou Qin and Wenke Lee Georgia Institute of Technology Atlanta, GA 30332, U.S.A. {xinzhou, wenke}@cc.gatech.edu Abstract

Add to Reading List

Source URL: wenke.gtisc.gatech.edu

Language: English - Date: 2011-08-22 15:12:58
    902ISCOn Security of a White-Box Implementation of SHARK  Yang SHI and Hongfei FAN

    ISCOn Security of a White-Box Implementation of SHARK Yang SHI and Hongfei FAN

    Add to Reading List

    Source URL: isc2015.item.ntnu.no

    Language: English - Date: 2015-09-20 14:17:24
    903PComP™ M  MesoCoat Inc. proposed novel nano-composite, solid lubricant coatings generated by High Velocity Oxygen Fuel (HVOF) spraying of nano/mesostructured powders to reduce the liquid metal attack to the tooling. Th

    PComP™ M MesoCoat Inc. proposed novel nano-composite, solid lubricant coatings generated by High Velocity Oxygen Fuel (HVOF) spraying of nano/mesostructured powders to reduce the liquid metal attack to the tooling. Th

    Add to Reading List

    Source URL: mesocoat.com

    Language: English - Date: 2014-08-07 09:16:55
      904RAPTOR: Routing Attacks on Privacy in Tor  arXiv:1503.03940v1 [cs.NI] 13 Mar 2015 Yixin Sun Princeton University

      RAPTOR: Routing Attacks on Privacy in Tor arXiv:1503.03940v1 [cs.NI] 13 Mar 2015 Yixin Sun Princeton University

      Add to Reading List

      Source URL: vanbever.eu

      Language: English - Date: 2015-03-17 04:19:13
      905MARCHISSUE # 7 UKRAINE UNDER ATTACK NEWSLETTER ON RUSSIAN OCCUPATION OF CRIMEA

      MARCHISSUE # 7 UKRAINE UNDER ATTACK NEWSLETTER ON RUSSIAN OCCUPATION OF CRIMEA

      Add to Reading List

      Source URL: www.scotlandrussiaforum.org

      Language: English - Date: 2016-03-04 13:30:09
        906APRILISSUE #11 UKRAINE UNDER ATTACK NEWSLETTER ON RUSSIAN OCCUPATION OF CRIMEA

        APRILISSUE #11 UKRAINE UNDER ATTACK NEWSLETTER ON RUSSIAN OCCUPATION OF CRIMEA

        Add to Reading List

        Source URL: www.scotlandrussiaforum.org

        Language: English - Date: 2016-03-04 13:30:09
          907Low-Cost Software Countermeasures Against Fault Attacks: Implementation and Performances Trade Offs Alessandro Barenghi Luca Breveglieri

          Low-Cost Software Countermeasures Against Fault Attacks: Implementation and Performances Trade Offs Alessandro Barenghi Luca Breveglieri

          Add to Reading List

          Source URL: euler.ecs.umass.edu

          Language: English - Date: 2011-03-24 10:57:36
          908Jiang J, Shan ZF, Wang X et al . JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY : 1– Mon. Year Understanding Sybil Groups in the Wild Jing Jiang1,2 (蒋 竞), Member, CCF, Zifei Shan2 (单子非), Xiao Wang2 (王 潇) Li Z

          Jiang J, Shan ZF, Wang X et al . JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY : 1– Mon. Year Understanding Sybil Groups in the Wild Jing Jiang1,2 (蒋 竞), Member, CCF, Zifei Shan2 (单子非), Xiao Wang2 (王 潇) Li Z

          Add to Reading List

          Source URL: www.zifeishan.org

          Language: English - Date: 2014-12-18 18:37:50
          909Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks Ryan Rasti∗† , Mukul Murthy∗ , Nicholas Weaver∗† , Vern Paxson∗† ∗ UC Berkeley, † ICSI,  VMware Abstract—We introduce tempor

          Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks Ryan Rasti∗† , Mukul Murthy∗ , Nicholas Weaver∗† , Vern Paxson∗† ∗ UC Berkeley, † ICSI,  VMware Abstract—We introduce tempor

          Add to Reading List

          Source URL: icir.org

          Language: English - Date: 2015-04-22 12:30:04