Cyberwarfare

Results: 11990



#Item
471Network theory / Networks / Cyberwarfare / Denial-of-service attack / Denial-of-service attacks / Internet Relay Chat / Multipath routing / Crowds / Centrality / Routing / Program evaluation and review technique

A Novel Framework for Modeling and Mitigating Distributed Link Flooding Attacks Christos Liaskos1 , Vasileios Kotronis2 and Xenofontas Dimitropoulos1 1 2

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2016-02-15 13:44:07
472Cyberwarfare / Standards organizations / National Institute of Standards and Technology / EO Personal Communicator / Computer security / NIST Cybersecurity Framework / Abramowitz and Stegun / Email

ITF Bulletin 25 November and 2 December 2013

Add to Reading List

Source URL: rtriplec.files.wordpress.com

Language: English - Date: 2013-12-09 17:52:23
473Cybercrime / Cyberwarfare / Computer security / Hacking / Military technology / Cyberterrorism / Cyber-attack / Cyber / United States Cyber Command / Cyber-security regulation

Stefanie Schmahl, Cybersecurity, in: Freiheit und Regulierung in der Cyberwelt – Rechtsidentifikation zwischen Quelle und Gericht, Berichte DGIR Bd. 47, HeidelbergSummary by Prof. Dr. Stefanie Schmahl, Würzburg

Add to Reading List

Source URL: www.dgfir.de

Language: English - Date: 2016-04-19 08:15:24
474Cyberwarfare / Computer network security / Computer security / Cryptography / National security / Secure communication / Software as a service

SBN-265 FOUNDED 2005 A full-service Information Technology consulting firm with core competencies in custom

Add to Reading List

Source URL: www.sbnonline.com

Language: English - Date: 2016-07-14 10:38:25
475National security / Cybercrime / Cyberwarfare / E-commerce / Grand Duchy of Finland / Jyvskyl / Computer security / Cyber

JYVÄSKYLÄN YLIOPISTO Threats and Security in the Cyber World Dr., Col (ret.) Martti Lehto

Add to Reading List

Source URL: www.nislab.no

Language: English - Date: 2014-09-01 14:30:51
476Security / Cyberwarfare / Prevention / Safety / Anarchist theory / Netwar / Hacking / Military technology / National security / John Arquilla / Decentralization / Military

THE ARTS This PDF document was made available CHILD POLICY

Add to Reading List

Source URL: www.nps.edu

Language: English - Date: 2013-06-21 18:18:23
477Cybercrime / Cyberwarfare / Social engineering / E-commerce / Computer network security / Phishing / Denial-of-service attack / Computer security / Targeted threat / Bitcoin / Malware / Supply chain attack

Financial Sector Threats 2015 Year in Review 1 Table of Contents

Add to Reading List

Source URL: info.digitalshadows.com

Language: English - Date: 2016-06-14 16:59:05
478Searches and seizures / Privacy of telecommunications / Computer network security / Cyberwarfare / Fourth Amendment to the United States Constitution / Electronic Communications Privacy Act / Search warrant / Patriot Act / Riley v. California / Probable cause / Search and seizure / Computer security

Written Statement Of The Center for Democracy & Technology Before The Judicial Conference Advisory Committee on Criminal Rules

Add to Reading List

Source URL: cdt.org

Language: English - Date: 2014-10-24 15:56:12
479Computer security / Computing / Cyberwarfare / Hacking / Computer network security / Veracode / Application security / Cross-site scripting / Vulnerability / Cross-site request forgery / JavaScript / Web application security

WHAT IS APPLICATION SECURITY? Every enterprise’s application landscape is now both business critical and rapidly expanding. “On our current

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2016-01-20 16:34:29
480Security / Aircraft instruments / Avionics / Attitude and heading reference system / Cyberwarfare / Computer security

Microsoft Word - 1-Policies-and-Guidelines 2012

Add to Reading List

Source URL: dnr.alaska.gov

Language: English - Date: 2016-05-13 16:30:55
UPDATE