DShield

Results: 13



#Item
1Cyberwarfare / Crime prevention / National security / Computer crimes / DShield / Phishing / Password / Malware / Vulnerability / Cybercrime / Computer security / Computer network security

  Reconceptualizing the Role of Security User L. Jean Camp Abstract: The Internet is not the only critical infrastructure that relies on the participation of

Add to Reading List

Source URL: www.ljean.com

Language: English - Date: 2014-06-07 19:18:24
2Cybercrime / Science / Antivirus software / DShield / Malware / Blacklist / Whitelist / Phishing / DNSBL / Spamming / Computer security / Computing

To appear in Usenix Security, AugustHighly Predictive Blacklisting Jian Zhang

Add to Reading List

Source URL: www.cyber-ta.org

Language: English - Date: 2008-05-20 23:18:29
3Network switch / Johannes Ullrich / Computing / Ethernet / DShield / Blacklist

N e w s b r i e f s New Blacklisting Technique Improves Network Security

Add to Reading List

Source URL: www.csl.sri.com

Language: English - Date: 2008-11-26 01:12:29
4Nimda / Thor / Hacker / Singapore / DShield / Spaceflight / Comics / Political geography

Welcome to Blackhat! Blackhat Security Briefings Singapore, October 4, 2002 Timothy M. Mullen AnchorIS.Com, Inc.

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:23
5Economics / Behavioral finance / Economic efficiency / Efficient-market hypothesis / Malware / DShield / Computer virus / Computer security / Threat / Computer network security / Financial economics / Finance

Microsoft PowerPoint - adapt_econ_models.ppt

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-25 05:22:54
6Environmental science / Scientific method / Scientific misconduct / DShield / Coordination / Science / Knowledge / Nature / Biology / Climatology / Data sharing

Towards Collaborative Data Sharing “U.S. Perspective” Karl Levitt Department of Computer Science UC Davis

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-14 13:46:13
7Linux / C Standard Library / GNU C Library / CentOS / Linux kernel / Linux Standard Base / Ubuntu / Debian / Software / Computer architecture / Free software

GHOST glibc gethostbyname() Vulnerability CVE[removed]Johannes B. Ullrich, Ph.D. SANS Technology Institute https://isc.sans.edu

Add to Reading List

Source URL: www.dshield.org

Language: English - Date: 2015-01-28 10:13:58
8

Monitoring emerging threats: SCADA Security Next step in cyberterrorism Manuel Santander, GCFA, GCIH [removed] [removed]

Add to Reading List

Source URL: handlers.dshield.org

Language: Spanish - Date: 2010-12-01 19:11:12
    9Computing / Client honeypot / Honeypot / Malware / Spyware / HoneyMonkey / Honeyd / Threat / Adware / Computer network security / Cyberwarfare / Computer security

    2nd Generation Honeyclients Robert Danford SANS Internet Storm Center Research funded in part with a grant from StillSecure (http://www.stillsecure.com) Author can be reached at:

    Add to Reading List

    Source URL: handlers.dshield.org

    Language: English - Date: 2009-09-30 11:18:14
    10Spamming / Computer security / Cyberwarfare / Honeynet Project / Port scanner / Image scanner / DShield / Botnets / Computer network security / Computing / Multi-agent systems

    Automating Analysis of Large-Scale Botnet Probing Events Zhichun Li, Anup Goyal and Yan Chen Northwestern University 2145 Sheridan Road Evanston, IL, USA

    Add to Reading List

    Source URL: www.icir.org

    Language: English - Date: 2009-01-06 03:42:50
    UPDATE