Cyberwarfare

Results: 11990



#Item
371Computer security / E-commerce / Cyberwarfare / Invensys / Eurotherm / Security / Cyber-attack

Services Profile Nuclear Cyber Security Solutions

Add to Reading List

Source URL: iom.invensys.com

Language: English - Date: 2012-11-23 05:08:06
372Cyberwarfare / Denial-of-service attacks / Internet Relay Chat / Computer security / Cybercrime / Harassment / Denial-of-service attack

C:rsro003umentsQQQue2tractsW29_RA_WangAbstract.wpd

Add to Reading List

Source URL: www.misq.org

Language: English - Date: 2016-05-09 11:18:17
373Cybercrime / Cyberwarfare / Computer security / National security / United States intelligence agencies / Cyberterrorism / Federal Bureau of Investigation / DoD Cyber Crime Center

PDF Document

Add to Reading List

Source URL: it.ojp.gov

Language: English - Date: 2016-07-14 13:57:00
374Cybercrime / Social engineering / Computer security / National security / Secure communication / Sony Pictures Entertainment hack / Phishing / IID / Cyberwarfare / Malware / Heartbleed / Data breach

eCrime Trends Report Fourth Quarter 2014

Add to Reading List

Source URL: internetidentity.com

Language: English - Date: 2015-02-25 14:12:04
375Computer access control / Cyberwarfare / Hacking Team / Spyware / Surveillance / Internet Explorer / Adobe Flash Player / POODLE / Common Vulnerabilities and Exposures

ESET_Logo_HorizontalClaim-White

Add to Reading List

Source URL: www.welivesecurity.com

Language: English - Date: 2016-01-22 06:05:11
376Cyberwarfare / Computer network security / Cybercrime / National security / Mobile Malware / Botnet / Malware / Peer-to-peer / Bayesian network / Cabir / Computer security / Delay-tolerant networking

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-07-06 14:15:10
377Cyberwarfare / United States Department of Homeland Security / Computer security

MSC Newsletter - March & April 2016 MSC to host Active Shooter and Cybersecurity Discussion-Based Tabletop Exercises at the Port of New Orleans. MSC Research PI Brant Mitchell, Director, Stephenson Disaster Management In

Add to Reading List

Source URL: web-oup.s3-fips-us-gov-west-1.amazonaws.com

Language: English - Date: 2016-05-03 12:26:11
378Computer network security / Cyberwarfare / Computer security / Machine learning / Cryptography / Anomaly detection / Intrusion detection system / Botnet / Algorithm / NP / Internet security / Pattern recognition

Attack-Test and Verification Systems, Steps Towards Verifiable Anomaly Detection Marcel Fourn´e, Dominique Petersen, Norbert Pohlmann Institut f¨ur Internet-Sicherheit Westf¨alische Hochschule Neidenburger Str. 43

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 12:57:31
379Computer network security / Cyberwarfare / Computer security / Cybercrime / Secure communication / Password / Intrusion detection system / Malware

Microsoft PowerPoint - 3_Cybersecurity_myths.pptx

Add to Reading List

Source URL: www.dote.osd.mil

Language: English - Date: 2015-06-12 17:08:23
380Cryptography / Computer network security / Computer security / Cyberwarfare / National security / Secure communication / Application security / Communications security / Wireless security / Software-defined radio / Advanced Learning and Research Institute / Software security assurance

NRL BAA Announcement # HIGH ASSURANCE ENGINEERING AND COMPUTING The Center for High Assurance Computer Systems of the Naval Research Laboratory (NRL) is seeking white papers for innovative research, advanced sys

Add to Reading List

Source URL: heron.nrl.navy.mil

Language: English - Date: 2016-02-17 10:17:54
UPDATE