DShield

Results: 13



#Item
1   Reconceptualizing the Role of Security User L. Jean Camp  Abstract: The Internet is not the only critical infrastructure that relies on the participation of

  Reconceptualizing the Role of Security User L. Jean Camp Abstract: The Internet is not the only critical infrastructure that relies on the participation of

Add to Reading List

Source URL: www.ljean.com

Language: English - Date: 2014-06-07 19:18:24
2To appear in Usenix Security, AugustHighly Predictive Blacklisting Jian Zhang

To appear in Usenix Security, AugustHighly Predictive Blacklisting Jian Zhang

Add to Reading List

Source URL: www.cyber-ta.org

Language: English - Date: 2008-05-20 23:18:29
3N e w s b r i e f s  New Blacklisting Technique Improves Network Security

N e w s b r i e f s New Blacklisting Technique Improves Network Security

Add to Reading List

Source URL: www.csl.sri.com

Language: English - Date: 2008-11-26 01:12:29
4Welcome to Blackhat! Blackhat Security Briefings Singapore, October 4, 2002 Timothy M. Mullen AnchorIS.Com, Inc.

Welcome to Blackhat! Blackhat Security Briefings Singapore, October 4, 2002 Timothy M. Mullen AnchorIS.Com, Inc.

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:23
5Microsoft PowerPoint - adapt_econ_models.ppt

Microsoft PowerPoint - adapt_econ_models.ppt

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-25 05:22:54
6Towards Collaborative Data Sharing “U.S. Perspective” Karl Levitt Department of Computer Science UC Davis

Towards Collaborative Data Sharing “U.S. Perspective” Karl Levitt Department of Computer Science UC Davis

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-14 13:46:13
7GHOST glibc gethostbyname() Vulnerability CVE[removed]Johannes B. Ullrich, Ph.D. SANS Technology Institute https://isc.sans.edu

GHOST glibc gethostbyname() Vulnerability CVE[removed]Johannes B. Ullrich, Ph.D. SANS Technology Institute https://isc.sans.edu

Add to Reading List

Source URL: www.dshield.org

Language: English - Date: 2015-01-28 10:13:58
8Monitoring emerging threats: SCADA Security Next step in cyberterrorism Manuel Santander, GCFA, GCIH [removed] [removed]

Monitoring emerging threats: SCADA Security Next step in cyberterrorism Manuel Santander, GCFA, GCIH [removed] [removed]

Add to Reading List

Source URL: handlers.dshield.org

Language: Spanish - Date: 2010-12-01 19:11:12
    9Computing / Client honeypot / Honeypot / Malware / Spyware / HoneyMonkey / Honeyd / Threat / Adware / Computer network security / Cyberwarfare / Computer security

    2nd Generation Honeyclients Robert Danford SANS Internet Storm Center Research funded in part with a grant from StillSecure (http://www.stillsecure.com) Author can be reached at:

    Add to Reading List

    Source URL: handlers.dshield.org

    Language: English - Date: 2009-09-30 11:18:14
    10Automating Analysis of Large-Scale Botnet Probing Events Zhichun Li, Anup Goyal and Yan Chen Northwestern University 2145 Sheridan Road Evanston, IL, USA

    Automating Analysis of Large-Scale Botnet Probing Events Zhichun Li, Anup Goyal and Yan Chen Northwestern University 2145 Sheridan Road Evanston, IL, USA

    Add to Reading List

    Source URL: www.icir.org

    Language: English - Date: 2009-01-06 03:42:50