Attack!

Results: 9771



#Item
951Fault Sensitivity Analysis Meets Zero-Value Attack  Oliver Mischke, Amir Moradi, Tim Güneysu Horst Görtz Institute for IT-Security  FDTC 2014, Busan,

Fault Sensitivity Analysis Meets Zero-Value Attack Oliver Mischke, Amir Moradi, Tim Güneysu Horst Görtz Institute for IT-Security FDTC 2014, Busan,

Add to Reading List

Source URL: conferenze.dei.polimi.it

Language: English - Date: 2014-10-30 13:06:56
    952The reconnaissance of Japanese 228 Infantry Regiment noted that the line was undermanned and vulnerable to attack. Under the decisions by the commander of the 228 Regiment, Colonel Doi Teishichi, 150 Japanese soldiers la

    The reconnaissance of Japanese 228 Infantry Regiment noted that the line was undermanned and vulnerable to attack. Under the decisions by the commander of the 228 Regiment, Colonel Doi Teishichi, 150 Japanese soldiers la

    Add to Reading List

    Source URL: hiking.gov.hk

    Language: English - Date: 2015-08-21 03:15:38
      953Differentiated Service over Content-Centric Networking

      Differentiated Service over Content-Centric Networking

      Add to Reading List

      Source URL: conferences2.sigcomm.org

      Language: English - Date: 2015-10-02 17:14:46
      954© 2014 Open Networking Foundation  SDN Security OpenFlow-Based DDoS Attack Mitigation Ali Tizghadam, Theodor Balanescu, Rahul Kumar, Kevin Jones, Walter Miron

      © 2014 Open Networking Foundation SDN Security OpenFlow-Based DDoS Attack Mitigation Ali Tizghadam, Theodor Balanescu, Rahul Kumar, Kevin Jones, Walter Miron

      Add to Reading List

      Source URL: opennetsummit.org

      Language: English - Date: 2016-02-08 16:11:58
        955The ARMADILLO-2 function  Free-start collision attack Semi-free-start collision attack

        The ARMADILLO-2 function Free-start collision attack Semi-free-start collision attack

        Add to Reading List

        Source URL: web.spms.ntu.edu.sg

        Language: English - Date: 2012-08-28 11:33:54
          956HI-CFG: Construction by Binary Analysis and Application to Attack Polymorphism Dan Caselden1 , Alex Bazhanyuk2, Mathias Payer3, Stephen McCamant4 , and Dawn Song3 1

          HI-CFG: Construction by Binary Analysis and Application to Attack Polymorphism Dan Caselden1 , Alex Bazhanyuk2, Mathias Payer3, Stephen McCamant4 , and Dawn Song3 1

          Add to Reading List

          Source URL: www.cs.berkeley.edu

          Language: English - Date: 2013-12-06 14:19:08
            957Attack Analysis and Detection for Ad Hoc Routing Protocols Yi-an Huang and Wenke Lee College of Computing Georgia Institute of Technology 801 Atlantic Dr.

            Attack Analysis and Detection for Ad Hoc Routing Protocols Yi-an Huang and Wenke Lee College of Computing Georgia Institute of Technology 801 Atlantic Dr.

            Add to Reading List

            Source URL: wenke.gtisc.gatech.edu

            Language: English - Date: 2011-08-22 15:12:58
              958NO MORE IMPUNITY:  GAZA’S HEALTH SECTOR UNDER ATTACK “I was near my colleague, Sho’ayeb, who was crying.

              NO MORE IMPUNITY: GAZA’S HEALTH SECTOR UNDER ATTACK “I was near my colleague, Sho’ayeb, who was crying.

              Add to Reading List

              Source URL: www.map-uk.org

              Language: English - Date: 2015-06-25 18:05:01
                959Public Service Award KTUU Television, Anchorage, “America On Alert: The Homefront” a panel of Anchorage residents young and old discussed their reactions to the Sept. 11, 2001 terrorist attack on New York and the Pen

                Public Service Award KTUU Television, Anchorage, “America On Alert: The Homefront” a panel of Anchorage residents young and old discussed their reactions to the Sept. 11, 2001 terrorist attack on New York and the Pen

                Add to Reading List

                Source URL: alaskapressclub.com

                Language: English - Date: 2013-12-09 15:08:22
                  960AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks Seungwon Shin† †  Vinod Yegneswaran‡

                  AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks Seungwon Shin† † Vinod Yegneswaran‡

                  Add to Reading List

                  Source URL: www.openflowsec.org

                  Language: English - Date: 2013-10-15 15:03:15