Hijacking

Results: 635



#Item
51Data Protection and Privacy Policy_FINAL_26 Feb 2014

Data Protection and Privacy Policy_FINAL_26 Feb 2014

Add to Reading List

Source URL: nic.accountant

Language: English - Date: 2016-05-19 06:25:01
52On Robust Covert Channels Inside DNS Lucas Nussbaum, Pierre Neyron and Olivier Richard Abstract Covert channels inside DNS allow evasion of networks which only provide a restricted access to the Internet. By encapsulatin

On Robust Covert Channels Inside DNS Lucas Nussbaum, Pierre Neyron and Olivier Richard Abstract Covert channels inside DNS allow evasion of networks which only provide a restricted access to the Internet. By encapsulatin

Add to Reading List

Source URL: www.loria.fr

Language: English - Date: 2011-10-12 09:35:39
53A joint project by:  GUIDE FOR TANKERS OPERATING IN ASIA AGAINST PIRACY AND ARMED ROBBERY INVOLVING OIL CARGO THEFT

A joint project by: GUIDE FOR TANKERS OPERATING IN ASIA AGAINST PIRACY AND ARMED ROBBERY INVOLVING OIL CARGO THEFT

Add to Reading List

Source URL: www.recaap.org

Language: English - Date: 2015-11-25 20:59:05
54PRODUCT INTELLIGENCE  ACTIVELY SECURING THE EXTENDED ENTERPRISE 1142 Broadway – Suite

PRODUCT INTELLIGENCE ACTIVELY SECURING THE EXTENDED ENTERPRISE 1142 Broadway – Suite

Add to Reading List

Source URL: internetidentity.com

Language: English - Date: 2014-02-06 12:31:20
55Political Hashtag Hijacking in the U.S. Asmelash Teka Hadgu Kiran Garimella  Ingmar Weber

Political Hashtag Hijacking in the U.S. Asmelash Teka Hadgu Kiran Garimella Ingmar Weber

Add to Reading List

Source URL: www2013.org

Language: English - Date: 2014-07-21 08:47:00
    56BGP Policy violations in the data-plane Pierre Francois, Institute IMDEA Networks Paolo Lucente, PMACCT

    BGP Policy violations in the data-plane Pierre Francois, Institute IMDEA Networks Paolo Lucente, PMACCT

    Add to Reading List

    Source URL: www.pmacct.net

    Language: English - Date: 2011-11-01 05:09:41
    57Exploiting Locality of Interest in Online Social Networks Mike P. Wittie, Veljko Pejovic, Lara Deek, Kevin C. Almeroth, Ben Y. Zhao Department of Computer Science University of California, Santa Barbara {mwittie, veljko,

    Exploiting Locality of Interest in Online Social Networks Mike P. Wittie, Veljko Pejovic, Lara Deek, Kevin C. Almeroth, Ben Y. Zhao Department of Computer Science University of California, Santa Barbara {mwittie, veljko,

    Add to Reading List

    Source URL: www.cs.ucsb.edu

    Language: English - Date: 2010-11-02 09:02:20
    58Privacy Policy DNS Made Easy values your privacy. Please read the following document carefully as this is the official policy in force at the present time. The policy listed below outlines how DNS Made Easy handles priva

    Privacy Policy DNS Made Easy values your privacy. Please read the following document carefully as this is the official policy in force at the present time. The policy listed below outlines how DNS Made Easy handles priva

    Add to Reading List

    Source URL: www.dnsmadeeasy.com

    Language: English - Date: 2015-12-08 13:37:24
    59CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities Long Lu† †  Zhichun Li‡

    CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities Long Lu† † Zhichun Li‡

    Add to Reading List

    Source URL: wenke.gtisc.gatech.edu

    Language: English - Date: 2014-03-13 19:06:41
      60Political Hashtag Hijacking in the U.S. Asmelash Teka Hadgu Kiran Garimella  Ingmar Weber

      Political Hashtag Hijacking in the U.S. Asmelash Teka Hadgu Kiran Garimella Ingmar Weber

      Add to Reading List

      Source URL: www2013.wwwconference.org

      Language: English - Date: 2014-07-21 08:47:00