Computer security conference

Results: 514



#Item
181Vulnerability / Software assurance / Application security / Penetration test / Fuzz testing / National Institute of Standards and Technology / Cross-site scripting / Web application security scanner / SAINT / Computer security / Software testing / Cyberwarfare

Testing Web Application Scanner Tools Elizabeth Fong and Romain Gaucher NIST Verify Conference – Washington, DC, October 30, 2007

Add to Reading List

Source URL: rgaucher.info

Language: English - Date: 2007-11-01 08:41:19
182Surveillance / French words and phrases / Crime prevention / Sociology / Civil disobedience / Sousveillance / Steve Mann / Wearable computer / Activity recognition / Technology / Security / National security

2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops An Introduction to the 3rd Workshop on Egocentric (First-person) Vision Steve Mann, Kris M. Kitani, Yong Jae Lee, M. S. Ryoo, Alireza Fathi Abstr

Add to Reading List

Source URL: www.wearcam.org

Language: English - Date: 2014-10-24 01:10:29
183Computing / Application security / Heap overflow / Qualys / Vulnerability / Metasploit Project / Shellcode / Exploit / Wireless security / Computer network security / Cyberwarfare / Computer security

HITBSECCONF2009 - DUBAI CONFERENCE KIT Event Overview Venue: Sheraton Dubai Creek

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:55:03
184Software testing / Qualys / OWASP / Vulnerability / Security / Hacker / Computer security / Cyberwarfare / Computing

HITB2011AMS  AGENDA  -­‐  CONFERENCE  DAY  1  -­‐  19TH  MAY  2011 TRACK  1 TRACK  2   TRACK  3  /  HITB  LABS

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 13:01:24
185Network architecture / Onion routing / Tor / Proxy server / Router / ANts P2P / Traffic analysis / The Onion / Firewall / Internet privacy / Computing / Internet

Michael G. Reed, Paul F. Syverson, and David M. Goldschlag. Proxies for Anonymous Routing, 12th Annual Computer Security Applications Conference, San Diego, CA, December 9-13, 1996. Proxies for Anonymous Routing Michael

Add to Reading List

Source URL: www.onion-router.net

Language: English - Date: 2013-01-23 17:17:14
186System software / Internet / Data security / Firewall / Internet censorship / Great Firewall of China / Ping / Router / Google China / Computer network security / Computing / Cyberwarfare

This paper will appear at the 14th ACM Conference on Computer and Communications Security, Oct. 29-Nov. 2, 2007 ConceptDoppler: A Weather Tracker for Internet Censorship Jedidiah R. Crandall

Add to Reading List

Source URL: www.cs.unm.edu

Language: English - Date: 2007-09-12 11:58:26
187Computing / Software testing / National security / Application security / Core Security Technologies / Vulnerability / OWASP / Voice over IP / Web application security / Computer network security / Security / Computer security

Conference Kit Version 2.0 * Over 30 Network Security Specialists and Researchers * 7-tracks of Hands on Technical Training Sessions * Network Assessment and Latest Attack Methods

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:50:30
188Software testing / Antivirus software / Cyberwarfare / Application security / Computer security / Malware / Network security / Hack / Vulnerability / Computing / Hacking / Software

Conference Kit * 30 Network Security Specialists and Researchers * 6-tracks of Hands on Technical Training Sessions * Network Assessment and Latest Attack Methods * Fundamental Defense Methodologies * Close Look At the L

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:49:07
189Surveillance / French words and phrases / Crime prevention / Sociology / Civil disobedience / Sousveillance / Steve Mann / Wearable computer / Activity recognition / Technology / Security / National security

2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops An Introduction to the 3rd Workshop on Egocentric (First-person) Vision Steve Mann, Kris M. Kitani, Yong Jae Lee, M. S. Ryoo, Alireza Fathi Abstr

Add to Reading List

Source URL: n1nlf-1.eecg.toronto.edu

Language: English - Date: 2014-10-24 01:10:29
190Surveillance / French words and phrases / Crime prevention / Sociology / Civil disobedience / Sousveillance / Steve Mann / Wearable computer / Activity recognition / Technology / Security / National security

2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops An Introduction to the 3rd Workshop on Egocentric (First-person) Vision Steve Mann, Kris M. Kitani, Yong Jae Lee, M. S. Ryoo, Alireza Fathi Abstr

Add to Reading List

Source URL: wearcam.org

Language: English - Date: 2014-10-24 01:10:29
UPDATE