Cyberwarfare

Results: 11990



#Item
351Domain name system / Cyberwarfare / Internet Standards / Internet protocols / Internet security / Name server / Cloudmark / Denial-of-service attack / Botnet / Domain Name System Security Extensions / Comparison of DNS server software

Microsoft Word - DNS Whitepaper_Resource Exhaustion_October_2014_v2.docx

Add to Reading List

Source URL: www.cloudmark.com

Language: English - Date: 2014-10-07 15:50:23
352Computer security / Computer network security / Cyberwarfare / Cryptography / National security / Threat / STRIDE / Attack / SQL injection / Denial-of-service attack

Microsoft PowerPoint - DenimGroup_SecondMostSecureDatabase_Content.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:18:14
353Cyberwarfare / Computational linguistics / Automatic identification and data capture / Computer accessibility / Speech recognition / Mel-frequency cepstrum / Computer security / Denial-of-service attack / Artificial neural network / CMU Sphinx / Vector / CAPTCHA

Hidden Voice Commands Nicholas Carlini∗ University of California, Berkeley Tavish Vaidya Georgetown University Clay Shields

Add to Reading List

Source URL: security.cs.georgetown.edu

Language: English - Date: 2016-06-29 23:07:54
354Domain name system / Cyberwarfare / Malware / Computer network security / Internet protocols / Malware analysis / Botnet / OpenDNS / Name server / Denial-of-service attack / Root name server / Payload

Sandnet: Network Traffic Analysis of Malicious Software Christian Rossow1,2 , Christian J. Dietrich1,3 , Herbert Bos2 , Lorenzo Cavallaro2 , Maarten van Steen2 , Felix C. Freiling3 , Norbert Pohlmann1 1 Institute for In

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-12-21 09:55:27
355Cybercrime / National security / Cyberwarfare / Computer security / Hacking / United States Cyber Command / United States Army Cyber Command / Cyber / Cyberwarfare in the United States / Military-digital complex

THE FACTS: CYBERSECURITY RESOURCES A collection of resources to help you protect yourself online. Free antivirus software is available online for DoD employees to download and use at home (authentication required) Websit

Add to Reading List

Source URL: www.arcyber.army.mil

Language: English - Date: 2016-03-15 15:31:42
356Industrial Internet Consortium / Cyberwarfare / Crime prevention / Cryptography / National security / IIC / Computer security / Object Management Group

Engineering Update November 2014 PURPOSE AND AUDIENCE This document provides an update to Engineering: The First Steps published in JulyThis document has the same audiences: Members:

Add to Reading List

Source URL: www.iiconsortium.org

Language: English - Date: 2016-07-25 11:57:07
357Mobile operating systems / Cloud clients / Smartphones / Cyberwarfare / Rootkit / Mobile security / Windows Mobile / Microsoft Windows / Symbian / WM6 / Android

When E.T. comes into Windows Mobile 6 a.k.a. PoC(k)ET Cedric Halbronn Sogeti / ESEC R&D cedric(at)security-labs.org

Add to Reading List

Source URL: esec-lab.sogeti.com

Language: English - Date: 2016-07-01 12:08:46
358Antivirus software / Computer network security / Cyberwarfare / ESET / Malware / David Harley / Computer virus / Sality / Stuxnet / Computer security / Internet security / Avira

March 2015 Feature Article: 50 Shades of Security Table of Contents 50 Shades of Security .................................................................................................................................

Add to Reading List

Source URL: www.virusradar.com

Language: English - Date: 2015-06-02 02:58:26
359Cyberwarfare / Denial-of-service attacks / Computer network security / Internet Relay Chat / Denial-of-service attack / DDoS mitigation / Botnet / Computer security / BlockDos / Draft:Corero Network Security

Whitepaper Industrial Control System Security COVER

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2016-05-16 11:11:13
360United States intelligence agencies / National security / Computer network security / Counter-terrorism / Cyberwarfare / Islamic State of Iraq and the Levant / Federal Bureau of Investigation / Threat / National Counterterrorism Center / Computer security / Joint Terrorism Task Force / United States Department of Homeland Security

Microsoft Word - terror211.doc

Add to Reading List

Source URL: docs.house.gov

Language: English
UPDATE