Attack model

Results: 101



#Item
1

Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach Samuel Jero Endadul Hoque†

Add to Reading List

Source URL: www.ndss-symposium.org

Language: English - Date: 2018-02-14 16:46:14
    2

    XVIth INTERNATIONAL CIFA FORUM REPEAL AND REPLACE AN ECONOMIC MODEL UNDER ATTACK?

    Add to Reading List

    Source URL: cifango.org

    Language: English - Date: 2018-05-18 13:11:15
      3Health / Medicine / Microbiology / Vaccination / Chordopoxvirinae / Poxviruses / Epidemiology / Vaccines / Smallpox / Vaccine / Vaccinia / Ring vaccination

      Mathematical Biosciences–251 www.elsevier.com/locate/mbs Effects of behavioral changes in a smallpox attack model S. Del Valle

      Add to Reading List

      Source URL: public.lanl.gov

      Language: English - Date: 2013-03-15 13:18:42
      4Cryptography / CramerShoup cryptosystem / Ciphertext indistinguishability / Malleability / Semantic security / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Encryption / Block cipher mode of operation / Attack model / Probabilistic encryption / Chosen-plaintext attack

      Non-Malleability: An Introduction and Survey of Recent Developments Cynthia Dwork∗ 1

      Add to Reading List

      Source URL: www.wisdom.weizmann.ac.il

      Language: English - Date: 2006-01-05 12:45:55
      5Computing / Internet Relay Chat / Network protocols / Web development / Clientserver model / Inter-process communication / Network architecture / Denial-of-service attack / Transmission Control Protocol / Hypertext Transfer Protocol / Load balancing / Web server

      A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds Yi-Hsuan Kungk , Taeho Lee† , Po-Ning Tsengk , Hsu-Chun Hsiaok ∗ , Tiffany Hyun-Jin Kim‡ ∗ , Soo Bum Lee§ ∗ , Yue-Hsun

      Add to Reading List

      Source URL: www.netsec.ethz.ch

      Language: English - Date: 2015-09-10 05:14:02
      6File sharing networks / Inter-process communication / File sharing / Clientserver model / Network architecture / Distributed computing / Peer-to-peer / Server / Gnutella / Denial-of-service attack / Social peer-to-peer processes / JXTA

      1 Clippee: A Large-Scale Client/Peer System Keno Albrecht, Ruedi Arnold, Roger Wattenhofer {kenoa,rarnold,wattenhofer}@inf.ethz.ch Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland

      Add to Reading List

      Source URL: ruedi-arnold.com

      Language: English - Date: 2011-12-23 03:13:22
      7Computer security / Computer network security / Threat model / SQL injection / Web application security / Attack / Server / Threat / Database / HDIV / Cross-site scripting

      Microsoft PowerPoint - OWASP_SanAntonio_February2006_SecondMostSecureDatabase.ppt

      Add to Reading List

      Source URL: denimgroup.com

      Language: English - Date: 2014-01-13 18:30:26
      8Cryptography / Deterministic encryption / Chosen-plaintext attack / Digital signature / Advantage / Attack model / Encryption / Block cipher / Search engine technology

      Leakage-Abuse Attacks Against Searchable Encryption David Cash Paul Grubbs Rutgers University

      Add to Reading List

      Source URL: paul.rutgers.edu

      Language: English - Date: 2015-10-18 00:55:12
      9National security / Crime prevention / Computer security / Cybercrime / Cyberwarfare / Kill chain / Cyber-attack / Malware

      USING AN EXPANDED CYBER KILL CHAIN MODEL TO INCREASE ATTACK RESILIENCY

      Add to Reading List

      Source URL: www.seantmalone.com

      Language: English - Date: 2016-08-04 16:29:49
      UPDATE