Computer network security

Results: 18127



#Item
911Security / Computing / Computer networking / Access control / Computer access control / Named data networking / Computer security / Computer network security / Content centric networking / Computer network / Router / IBAC

Interest-Based Access Control for Content-Centric Networks ∗ Cesar Ghali Marc A. Schlosberg

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-10-01 13:18:45
912Security / Computing / Computer security / Cyberwarfare / Computer network security / Cybercrime / National security / Threat / Information security operations center / Abuse / United States Computer Emergency Readiness Team / New Jersey Cybersecurity and Communications Integration Cell

AbuseSA Build a More Resilient World KEY ABUSESA FEATURES: • Automated Data Collection

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:12
913Computer network security / Cyberwarfare / Computer security / Salvatore J. Stolfo / Cryptography / Intrusion detection system / Decoy / Network security / Rootkit / Malware / Computer virus / Antivirus software

Insider Threats Designing Host and Network Sensors to Mitigate the Insider Threat Insider attacks—that is, attacks by users with privileged

Add to Reading List

Source URL: ids.cs.columbia.edu

Language: English - Date: 2011-09-04 10:44:35
914Computing / Cryptography / IPsec / Network architecture / Cryptographic protocols / Computer network security / Virtual private networks / Cryptographic software / Internet Key Exchange / StrongSwan / Opportunistic encryption / NAT traversal

strongSwan The new IKEv2 VPN Solution Andreas Steffen Copyright © 2007 by Andreas Steffen

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2007-05-26 10:12:50
915Computer security / Software / Cyberwarfare / Antivirus software / Malware / Rootkits / Computer network security / Kaspersky Lab / Duqu / Kaspersky Anti-Virus / Duke

THE DUKES 7 years of Russian cyberespionage TLP: WHITE This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the Dukes, a well-resourced, highly

Add to Reading List

Source URL: www.f-secure.com

Language: English - Date: 2015-09-17 01:34:34
916Security / Cryptography / Cyberwarfare / Computer network security / Computer security / Crime prevention / National security

POSTER: Security By Mobility in Location and Track Verification Matthias Schäfer† † Daniel S. Berger†

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2015-08-08 10:29:40
917Computing / Network architecture / Computer network security / Information technology management / Configuration management / Software-defined networking / OpenFlow / Controller / Stateful firewall / Open vSwitch / Firewall / Control theory

HotSwap: Correct and Efficient Controller Upgrades for Software-Defined Networks Laurent Vanbever Joshua Reich

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-06-13 09:26:16
918Computer security / Computer network security / Cryptography / E-commerce / Secure communication / Cross-site request forgery / SQL injection / Password / Salt / Transport Layer Security / Application security / OWASP

Application Security Checklist V1.0 Document Audience Application Developers

Add to Reading List

Source URL: security.uci.edu

Language: English - Date: 2016-02-23 10:01:01
919Secure communication / Cryptographic protocols / Internet Standards / Computer network security / Transport Layer Security / HTTPS / OpenSSL / Cipher suite / Handshaking / End-to-end encryption / Middlebox / Extensible Authentication Protocol

Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS David Naylor? , Kyle Schomp† , Matteo Varvello‡ , Ilias Leontiadis‡ , Jeremy Blackburn‡ , Diego Lopez‡ , Konstantina Papagiannaki‡ ,

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2015-07-29 16:55:02
920Security / Prevention / Computer security / Computer network security / Data security / Cryptography / Information security / Threat / Managed security service / Risk management / Asset / Vulnerability

In Brief WideAngle Managed Security Services (MSS) The threat landscape is evolving quickly – and Managed Security Services (MSS) can be

Add to Reading List

Source URL: www.nttcomsecurity.com

Language: English - Date: 2015-07-14 05:58:47
UPDATE