Computer insecurity

Results: 197



#Item
11CyberSafety: On the Interactions between CyberSecurity and the Software Engineering of Safety-Critical Systems C.W. Johnson, Department of Computing Science, University of Glasgow, Glasgow, Scotland, UK, G12 8RZ. johnson

CyberSafety: On the Interactions between CyberSecurity and the Software Engineering of Safety-Critical Systems C.W. Johnson, Department of Computing Science, University of Glasgow, Glasgow, Scotland, UK, G12 8RZ. johnson

Add to Reading List

Source URL: www.dcs.gla.ac.uk

Language: English - Date: 2011-06-02 08:43:05
12Building Code for Medical Device Software Security Tom Haigh and Carl Landwehr READ ON!

Building Code for Medical Device Software Security Tom Haigh and Carl Landwehr READ ON!

Add to Reading List

Source URL: cybersecurity.ieee.org

Language: English - Date: 2015-05-01 08:08:57
13Securing Anonymous Communication Channels under the Selective DoS Attack Anupam Das and Nikita Borisov University of Illinois at Urbana Champaign, USA {das17,nikita}@illinois.edu Abstract. Anonymous communication systems

Securing Anonymous Communication Channels under the Selective DoS Attack Anupam Das and Nikita Borisov University of Illinois at Urbana Champaign, USA {das17,nikita}@illinois.edu Abstract. Anonymous communication systems

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2013-03-07 16:53:15
14A Quantitative Analysis of the Insecurity of Embedded Network Devices: Results of a Wide-Area Scan Ang Cui and Salvatore J. Stolfo Department of Computer Science, Columbia University  {ang,sal}@cs.columbia.edu

A Quantitative Analysis of the Insecurity of Embedded Network Devices: Results of a Wide-Area Scan Ang Cui and Salvatore J. Stolfo Department of Computer Science, Columbia University {ang,sal}@cs.columbia.edu

Add to Reading List

Source URL: www.redballoonsecurity.com

Language: English - Date: 2014-02-27 21:40:35
15SEVENTH FRAMEWORK PROGRAMME Information & Communication Technologies Trustworthy ICT NETWORK OF EXCELLENCE  A European Network of Excellence in Managing Threats and

SEVENTH FRAMEWORK PROGRAMME Information & Communication Technologies Trustworthy ICT NETWORK OF EXCELLENCE A European Network of Excellence in Managing Threats and

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2015-01-09 11:36:39
16TOP 10 where Security-OBLIGATED Executives should focus Introduction

TOP 10 where Security-OBLIGATED Executives should focus Introduction

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-21 02:20:33
17TOP 10 where Security-OBLIGATED Executives should focus Introduction

TOP 10 where Security-OBLIGATED Executives should focus Introduction

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-21 02:20:33
18THE DESERT FALCONS TARGETED ATTACKS Version 2.0 February, 2015 #TheSAS2015 #FalconsAPT

THE DESERT FALCONS TARGETED ATTACKS Version 2.0 February, 2015 #TheSAS2015 #FalconsAPT

Add to Reading List

Source URL: securelist.com

Language: English - Date: 2015-02-18 10:35:53
19SECURE V2V COMMUNICATION  ! A Technique for Secure
 Vehicle-to-Vehicle Communication

SECURE V2V COMMUNICATION ! A Technique for Secure
 Vehicle-to-Vehicle Communication

Add to Reading List

Source URL: galois.com

Language: English - Date: 2014-07-23 20:12:18
20Information at all.nethttp://all.net/

Information at all.nethttp://all.net/

Add to Reading List

Source URL: all.net

Language: English - Date: 2013-07-10 14:10:09