Covert

Results: 573



#Item
21

Detecting Covert Timing Channels with Time-Deterministic Replay Ang Chen W. Brad Moore Hanjun Xiao

Add to Reading List

Source URL: www.cis.upenn.edu

- Date: 2014-09-10 21:04:33
    22

    Does beat perception rely on the covert use of the motor system? Esther J. Walker () John R. Iversen () Department of Cognitive Science, University of

    Add to Reading List

    Source URL: mindmodeling.org

    - Date: 2014-08-06 21:24:25
      23

      PSUDP: A PASSIVE APPROACH TO NETWORK-WIDE COVERT COMMUNICATION KENTON BORN

      Add to Reading List

      Source URL: media.blackhat.com

      - Date: 2012-04-07 14:52:47
        24

        Covert Channels in the IP Time To Live Field Sebastian Zander, Grenville Armitage, Philip Branch Centre for Advanced Internet Architectures (CAIA) Swinburne University of Technology Melbourne Australia {szander, garmitag

        Add to Reading List

        Source URL: caia.swin.edu.au

        - Date: 2006-12-18 19:23:09
          25

          This code of practice provides guidance and rules on authorisations for the use or the conduct of covert human intelligence sources under Part 2 of the Regulation of Investigatory Powers ActIt sets out the authori

          Add to Reading List

          Source URL: www.gov.uk

          - Date: 2014-12-09 14:16:11
            26

            Ballot measure will help bay Area prepare for coming mega-storm By Adrian Covert August 25, 2015   California is learning a hard lesson about inadequate drought preparation. But if California’s

            Add to Reading List

            Source URL: documents.bayareacouncil.org

            - Date: 2015-09-08 12:26:27
              27

              Are balls of light in the sky created by covert technology? William C. Treurniet Ottawa, Ontario, Canada www.treurniet.ca/wonder Summary. Luminous orbs seen moving across the sky sometimes behave as if they are under int

              Add to Reading List

              Source URL: www.treurniet.ca

              - Date: 2012-01-26 17:22:38
                28

                A story of scorching deserts, icy wastes and woodland glades Norton Covert How to find Norton Covert

                Add to Reading List

                Source URL: bcgs.info

                - Date: 2016-03-26 10:24:20
                  29

                  Sixth Annual Conference on Privacy, Security and Trust A Protocol for Building Secure and Reliable Covert Channel Baishakhi Ray University Of Colorado, Boulder Department Of Computer Science

                  Add to Reading List

                  Source URL: rayb.info

                  - Date: 2016-08-19 22:20:15
                    30

                    Income by Household 2010 Seneca County, NY Seneca Covert Fayette

                    Add to Reading List

                    Source URL: www.gflrpc.org

                    - Date: 2014-08-25 14:02:38
                      UPDATE