Cyberwarfare

Results: 11990



#Item
421Cyberwarfare / First Responder Network Authority / International Multilateral Partnership Against Cyber Threats / Computer security / Next Generation 9-1-1 / Cyber-security regulation / New Jersey Cybersecurity and Communications Integration Cell

iCERT Industryy Council for Emergency Industr Response Technologies

Add to Reading List

Source URL: www.theindustrycouncil.org

Language: English - Date: 2016-05-23 17:14:30
422Malware / Malware analysis / Cyberwarfare

Malware Dynamic Analysis Part 1 Veronica Kovah vkovah.ost at gmail

Add to Reading List

Source URL: opensecuritytraining.info

Language: English - Date: 2015-10-04 21:23:17
423Surveillance / Data security / System administration / Splunk / Cyberwarfare / Computer network security / Computer security / Security operations center / Security / Information security operations center / International Multilateral Partnership Against Cyber Threats

SECURITY PROFESSIONAL SERVICES Security Professional Services Augmenting Security Staff, Addressing Skill Shortages and Optimizing Your Security Operations With Splunk

Add to Reading List

Source URL: www.splunk.com

Language: English - Date: 2016-08-17 08:31:42
424Cybercrime / E-commerce / Cyberwarfare / Computer network security / Address space layout randomization / Return-oriented programming / PaX / Computer security / Exploit / Timing attack / Side-channel attack / Phishing

Moving Target Techniques: Leveraging Uncertainty for Cyber Defense Hamed Okhravi, William W. Streilein, and Kevin S. Bauer Cyber moving target techniques involve

Add to Reading List

Source URL: www.ll.mit.edu

Language: English - Date: 2016-07-12 15:04:32
425Cyberwarfare / Computer security / Cybercrime / National security / Knowledge representation / Cyber-security regulation / Ontology / Upper ontology / Common Vulnerabilities and Exposures / Mitre Corporation / National Cyber Security Division / Michigan Cyber Range

doicomjnl/bxu101

Add to Reading List

Source URL: comjnl.oxfordjournals.org

Language: English
426Internet Standards / Cyberwarfare / Internet protocols / Internet Protocol / Videotelephony / Denial-of-service attack / WHOIS / IPv6 / Computer emergency response team / United States Computer Emergency Readiness Team / IPv4 / Computer security

You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications Frank Li† Zakir Durumeric∗‡? Jakub Czyz∗ Mohammad Karami Michael Bailey‡ Damon McCoy. Stefan Savage◦ Vern Paxson†? of California

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2016-07-17 01:33:31
427Computer network security / Multi-agent systems / Spamming / Botnets / Cyberwarfare / Command and control / Denial-of-service attack / ZeroAccess botnet / Communications protocol / NetFlow / Kelihos botnet / Transmission Control Protocol

CoCoSpot: Clustering and Recognizing Botnet Command and Control Channels using Traffic Analysis1 Christian J. Dietricha,c , Christian Rossowa,b , Norbert Pohlmanna a Institute for Internet Security, University of Applie

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:17:15
428Cyberwarfare / Computer network security / Spamming / Cybercrime / Multi-agent systems / Ransomware / Computer security / Malware / Denial-of-service attack / Botnet / Search warrant / Phishing

Comments on Proposed Remote Search Rules Steven M. Bellovin Columbia University∗ Matt Blaze University of Pennsylvania*

Add to Reading List

Source URL: www.privacyink.org

Language: English - Date: 2015-10-13 22:14:45
429Cybercrime / National security / Hacking / Military technology / Cyberwarfare / Allied Command Transformation / International Multilateral Partnership Against Cyber Threats / Cyber / Computer security / NATO / Cooperative Cyber Defence Centre of Excellence

NORTH ATLANTIC TREATY ORGANISATION NATO MARITIME INTERDICTION OPERATIONAL TRAINING CENTRE NMIOTC SOUDA BAYCHANIA HELLAS

Add to Reading List

Source URL: www.nmiotc.nato.int

Language: English - Date: 2016-05-16 04:04:14
430Cyberwarfare / Cybercrime / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / Computer security / United States Department of Homeland Security / National Cybersecurity Center of Excellence / Homeland Security Cybersecurity Boots-on-the-Ground Act

ReviewerDocFinal-Packaging-2-To-Email-1.docx

Add to Reading List

Source URL: cpol.army.mil

Language: English - Date: 2016-07-18 08:12:21
UPDATE