Attack

Results: 9771



#Item
41

Chapter 2 Proportionality and precautions in attacks Section 1 – Proportionality in Attack 1. Customary International Humanitarian Law Rule 14. Launching an attack which may be expected to cause incidental loss of civi

Add to Reading List

Source URL: devers-avocats.fr

Language: English - Date: 2018-04-12 05:43:13
    42

    A High-Resolution Side-Channel Attack on Last-Level Cache Mehmet Kayaalp IBM Research Nael Abu-Ghazaleh

    Add to Reading List

    Source URL: www.cs.ucr.edu

    Language: English - Date: 2016-02-23 16:36:47
      43

      LDPC and MDPC Codes QC-MDPC McEliece Attack of Guo et al. QC-LDPC McEliece Our Attack

      Add to Reading List

      Source URL: 2017.pqcrypto.org

      Language: English - Date: 2017-06-28 03:18:50
        44

        XVIth INTERNATIONAL CIFA FORUM REPEAL AND REPLACE AN ECONOMIC MODEL UNDER ATTACK?

        Add to Reading List

        Source URL: cifango.org

        Language: English - Date: 2018-05-18 13:11:15
          45

          WHITE PAPER LANDSCAPE OVERVIEW Mobile apps have become the digital touchpoint of choice, overtaking time spent in the web browser. This exposes a valuable new attack surface which is rapidly attracting the attentions of

          Add to Reading List

          Source URL: www.approov.io

          Language: English - Date: 2018-07-18 07:07:09
            46

            Greatest Movie Instrumentals (Volume #2) 1) Apocalypse Now – Main Theme (Helicopter Attack) (Wagner: Ride of the ValkyriesCity Slickers – Main Theme

            Add to Reading List

            Source URL: melaman2.com

            Language: English
              47

              From the Tower Golden Flight II – Attack of the Mongols Barony of Southron Gaard

              Add to Reading List

              Source URL: sg.sca.org.nz

              Language: English - Date: 2011-10-31 06:32:34
                48

                features Die hard dinosaurs When Brian J Ford produced a new theory on the life of dinosaurs he came under fierce attack from palaeontologists. Here he gives the background to his theory and describes the storm it creat

                Add to Reading List

                Source URL: brianjford.com

                Language: English - Date: 2014-03-15 14:29:13
                  49

                  Attack-preserving Security Protocol Transformations Binh Thanh Nguyen, David Basin, and Christoph Sprenger Institute of Information Security, ETH Zurich, Switzerland {thannguy,basin,sprenger}@inf.ethz.ch Abstract. The r

                  Add to Reading List

                  Source URL: people.inf.ethz.ch

                  Language: English - Date: 2014-04-16 16:25:39
                    50

                    International Journal of Gas Turbine, Propulsion and Power Systems October 2017, Volume 9, Number 3 Experimental Investigation of Droplets Characteristics after the Trailing Edge at Different Angle of Attack Baber Javed1

                    Add to Reading List

                    Source URL: www.gtsj.org

                    Language: English - Date: 2017-11-05 22:32:56
                      UPDATE