Cyber University

Results: 576



#Item
1Computer security / Cybercrime / Cyberwarfare / Computer network security / Security engineering / Computing / National security / Deception technology / Cyberattack / Intrusion detection system / Botnet / Denial-of-service attack

Poster: A Website Protection Framework Against Targeted Attacks based on Cyber Deception Jianbao Lin*, Chaoge Liu†, Xiang Cui*†‡, Zhaopeng Jia* * Beijing University of Posts and Telecommunications, Beijing, China

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-15 12:53:26
2Cryptography / Obfuscation / Computer security / Password / Security / Cyberwarfare / Salt / Identity management / Password policy / Password fatigue

Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 08:13:56
3Security / Security breaches / Prevention / Ransomware / Cybercrime / Malware / Locky / Computer security

Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-24 15:44:20
4Model checkers / Software engineering / Formal methods / Theoretical computer science / Software quality / Computing / PRISM model checker / Model checking / Formal verification / Markov chain / Stochastic / Reliability engineering

Advances and Challenges of Quantitative Verification and Synthesis for Cyber-Physical Systems Marta Kwiatkowska Department of Computer Science, University of Oxford, UK Abstract—We are witnessing a huge growth of cyber

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2016-09-02 06:46:32
5

Cyber-War and the Law of Armed Conflict Moderator: Professor Samuel Rascoff, New York University School of Law Panelists:

Add to Reading List

Source URL: www.ca2.uscourts.gov

Language: English - Date: 2015-06-10 15:39:31
    6

    Géza KOLUMBÁN Pázmány Péter Catholic University, Budapest, Hungary Limits and applicability of UWB Impulse Radio Technology in Cyber-Physical Systems, In-Car

    Add to Reading List

    Source URL: users.itk.ppke.hu

    Language: English - Date: 2017-10-06 05:47:59
      7

      Position Announcement PhD Position in Computational Social Simulation The University of Central Florida (UCF) invites applications for one or more PhD position(s) in computational social simulation. The selected candidat

      Add to Reading List

      Source URL: cyber.ist.ucf.edu

      Language: English - Date: 2017-12-22 16:27:51
        8

        STACKABLE CREDENTIALS IN CYBER SECURITY Presented by Dr. Rob Robertson (Southern Utah University) Matt Heffelfinger (Las Vegas Sands Corp.)

        Add to Reading List

        Source URL: www.fbcinc.com

        Language: English - Date: 2017-11-15 14:36:44
          9

          Recruitment PhD Students/Interns & Postdocs on Cyber Security at SUTD, Singapore Singapore University of Technology and Design (SUTD) is a young university which was established in collaboration with MIT. iTrust is a Cyb

          Add to Reading List

          Source URL: jianying.space

          Language: English - Date: 2017-12-11 07:55:51
            10

            Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents Yang Liu1 , Armin Sarabi1 , Jing Zhang1 , Parinaz Naghizadeh1 Manish Karir2 , Michael Bailey3 , Mingyan Liu1,2 1 EECS Department, University of Michiga

            Add to Reading List

            Source URL: nsrg.ece.illinois.edu

            Language: English - Date: 2018-06-11 12:51:20
              UPDATE