Computer network security

Results: 18127



#Item
861Prevention / Computing / Safety / Computer network security / Computer security / Cryptography / Cyberwarfare / National security / Secure communication / Cyber-physical system / Dependability

DECSoS 2015: EWICS/ERCIM/ARTEMIS Dependable Cyber-Physical Systems and Systems-of-Systems Workshop Programme September 22, 2015 Delft, The Netherlands Tuesday, 22nd September 2015

Add to Reading List

Source URL: safecomp2015.tudelft.nl

Language: English - Date: 2015-09-14 10:24:23
862Computer network security / Deep packet inspection / Internet censorship / Net neutrality / File sharing / Firewall / Internet / Content-control software / Sandvine / Telecoms Package / Copyright infringement / Peer-to-peer

Microsoft Word - Filtering.briefing.doc

Add to Reading List

Source URL: www.iptegrity.com

Language: English - Date: 2011-08-21 08:05:13
863Software / Computing / System software / IPsec / Computer network security / Virtual private networks / Cryptographic software / Key management / StrongSwan / Internet Key Exchange / NetworkManager / Maemo

The Open Source VPN Solution for Mobile Platforms  Fully Integrated NetworkManager Applets for the Gnome and KDE 4 Plasma Linux Desktops.  strongSwan Applets for Android and Nokia Maemo.

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2010-06-11 08:23:07
864Computer network security / Deep packet inspection / Transmission Control Protocol / Man-in-the-middle attack

Pluggable Transports Roadmap Steven J. Murdoch and George Kadianakis , Tor Tech ReportMarch 17, 2012

Add to Reading List

Source URL: research.torproject.org

Language: English - Date: 2012-08-26 02:02:15
865Computer network security / Decoy / Cryptography / Salvatore J. Stolfo / Honeypot / Computer security

Bait and Snitch: Defending Computer Systems with Decoys Jonathan Voris, Jill Jermyn, Angelos D. Keromytis, and Salvatore J. Stolfo Department of Computer Science Columbia University, New York, NY 10027 {jvoris@cs., jj260

Add to Reading List

Source URL: ids.cs.columbia.edu

Language: English - Date: 2012-12-05 15:53:47
866Computer security / Security / Computer network security / Computing / Software testing / Codenomicon / Coriant / Vulnerability management

Creating Trust with Coriant Power suppliers, critical infrastructure providers, and network builders all operate in an unsafe world, where cyber attacks and network malfunctions can disrupt services. Coriant’s customer

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:14
867Crime prevention / Cryptography / National security / Automotive industry / European Network Exchange / Isse punctata / Isse / European Data Protection Supervisor / European Union Agency for Network and Information Security / Giovanni Buttarelli / Computer security / Cryptomathic

ISSE/2015/Press releases/Programme FINAL 15th July 2015 Europe’s Leading Independent Interdisciplinary Security Conference Unveils 2015 Programme ISSE 2015 takes place 10th and 11th November 2015, Hotel Palace Berlin,

Add to Reading List

Source URL: www.isse.eu.com

Language: English - Date: 2015-07-28 07:23:48
868Computing / Spamming / Cyberspace / Computer network security / Botnets / Multi-agent systems / Email / Computer virus / Email spam / Malware / Computer worm / Slenfbot

The silent network Denying the spam and malware chatter using free tools Peter N. M. Hansteen

Add to Reading List

Source URL: home.nuug.no

Language: English - Date: 2007-05-18 16:29:18
869Cyberwarfare / Computer security / Security / Computer network security / Denial-of-service attacks / SQL Slammer / Code Red / Computer worm / Witty

Preliminary Results Using Scale-Down to Explore Worm Dynamics Nicholas Weaver∗ Ihab Hamadeh†

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:10
870Cyberwarfare / Computer network security / Denial-of-service attacks / Computer networking / Named data networking / Interest Flooding Attack / Denial-of-service attack / Forwarding plane / Computer network / Computer security

Revisiting Countermeasures Against NDN Interest Flooding Samir Al-Sheikh Matthias Wählisch

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-10-01 13:27:13
UPDATE