Malicious

Results: 683



#Item
171Computing / Network architecture / Internet / Internet Standards / Routing protocols / Internet protocols / Routing / Computer networking / Border Gateway Protocol / Router / Forwarding plane / Control plane

Peer Pressure: Exerting Malicious Influence on Routers at a Distance Max Schuchard1 , Christopher Thompson2 , Nicholas Hopper1 , and Yongdae Kim3 1 Department of Computer Science and Engineering, University of Minnesota

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2013-07-08 10:49:22
172

McAfee Protect your valuable business data against malicious viruses and malware attacks with world-class security services from McAfee. With no hardware to buy and no software to install, plus the benefit of automatic u

Add to Reading List

Source URL: www.centurylinkhostedservices.com

Language: English
    173

    UC Santa Barbara Taming the Malicious Web Christopher Kruegel Lastline Inc. and UC Santa Barbara

    Add to Reading List

    Source URL: www2.nict.go.jp

    Language: English - Date: 2014-02-27 19:50:45
      174Computer security / Malware / JavaScript / Threat / Change detection / Botnet / Computer network security / Computing / Cyberwarfare

      Poster: Web Change Analysis Approach for Malicious Website Detection SangYong Choi HoMook Cho

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2015-05-11 16:42:22
      175Electronic voting / Information society / Voting machine / Voting system / Electoral fraud / Sociology / Government / Politics / Elections / Election fraud

      An overview of cyber-crime in 2002 Acts of malicious intent: A few examples An overview of cyber-crime in 2002

      Add to Reading List

      Source URL: www.clusif.fr

      Language: English - Date: 2003-11-14 10:04:45
      176

      An extended abstract of this paper was published in the proceedings of AsiacryptComputationally Secure Pattern Matching in the Presence of Malicious Adversaries Carmit Hazay∗

      Add to Reading List

      Source URL: www.eng.biu.ac.il

      Language: English - Date: 2013-02-05 01:02:43
        177Secure two-party computation / Pseudorandomness / Random oracle / Security parameter / Zero-knowledge proof / IP / Universal composability / Verifiable secret sharing / Cryptography / Cryptographic protocols / Secure multi-party computation

        Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries∗ Carmit Hazay† Yehuda Lindell†

        Add to Reading List

        Source URL: www.eng.biu.ac.il

        Language: English - Date: 2014-09-16 05:37:56
        178

        Efficient Set Operations in the Presence of Malicious Adversaries Carmit Hazay∗ Kobbi Nissim† November 25, 2010

        Add to Reading List

        Source URL: www.eng.biu.ac.il

        Language: English - Date: 2010-11-25 08:58:28
          179Computer security / Antivirus software / Malware / Payment Card Industry Data Security Standard / Computer virus / Spyware / Rootkit / Unified threat management / Espionage / Computer network security / Cyberwarfare

          CYLANCEPROTECT + App Control What is AppControl? Traditional antivirus products use a blacklisting approach that allows all applications to run unless they are known to be malicious or exhibit known bad behaviors. Applic

          Add to Reading List

          Source URL: cdn2.hubspot.net

          Language: English - Date: 2015-05-05 12:00:46
          180

          Guidelines to Improve the Robustness of the OSGi Framework and Its Services against Malicious or Badly

          Add to Reading List

          Source URL: www.osgi.org

          Language: English - Date: 2013-02-05 20:22:16
            UPDATE