Malicious

Results: 683



#Item
641Routing / Internet protocols / Internet standards / Border Gateway Protocol / IP hijacking / Router / Traceroute / Network architecture / Internet / Computing

The End of Undetected BGP Route Hijacking (Detecting malicious behavior using global data analytics) 19 May 2014 Speaker LINX 85

Add to Reading List

Source URL: www.renesys.com

Language: English - Date: 2014-05-19 08:43:56
642Lease / Property law / Real estate / Real property law / 29th Avenue Station / Fee / Law / Property / Renting

DAMAGES- The rental group will be responsible for any accidental, willful and/or malicious damage caused to the premises resulting from events immediately prior to, during or after the rental. Rental groups are responsib

Add to Reading List

Source URL: www.renfrewcc.com

Language: English - Date: 2014-06-10 13:42:56
643Software licenses / Privacy-invasive software / Spyware / Computer law / Internet privacy / End-user license agreement / Espionage / System software / Malware

As computers are increasingly more integrated into our daily lives we become more dependent on software. This situation is exploited by villainous actors on the Internet that distribute malicious software in search for f

Add to Reading List

Source URL: www.bth.se

Language: English - Date: 2012-09-18 08:25:55
644Cybernetics / Information Age / Information theory / Logarithm / Time complexity / Applied mathematics / Mathematics / Communication

Journal of Machine Learning Research ? (????) ?-?? Submitted 5/09; Revised 10/09; Published ??/?? Learning Halfspaces with Malicious Noise Adam R. Klivans

Add to Reading List

Source URL: www.phillong.info

Language: English - Date: 2013-08-07 12:06:18
645Arrestable offence / Harassment in the United Kingdom / Crimes / Sex crimes / English criminal law / Law in the United Kingdom / United Kingdom

A freeB.E.A.G.L.E.S. briefing (www.freebeagles.org) Malicious Phone Calls The two main pieces of legislation to be aware of are Section 43 of the Telecommunications Act 1984 and the Protection from Harassment Act 1997.

Add to Reading List

Source URL: www.freebeagles.org

Language: English - Date: 2011-10-13 17:04:36
646Medicine / Neuroscience / Brain implant / Brain-computer interfacing / Mind control / Motherboard / Personal computer hardware / Resident Evil 5 / Implants / Human–computer interaction / Neuroprosthetics

MALICIOUS LOGIC DESCRIPTION: This is a moderately difficult adventure for 2+ characters. The players should be equipped in some way in advance to deal with spirits. The GM is also encouraged to create detailed maps and o

Add to Reading List

Source URL: members.tripod.com

Language: English - Date: 2001-11-05 23:51:00
647Hardware virtualization / Hardware-assisted virtualization / Kernel-based Virtual Machine / Hypervisor / Hyper-V / QEMU / X86 virtualization / Ring / Device driver / System software / Software / Virtual machines

iKernel: Isolating Buggy and Malicious Device Drivers Using Hardware Virtualization Support Lin Tan, Ellick M. Chan, Reza Farivar, Nevedita Mallick Jeffrey C. Carlyle, Francis M. David, Roy H. Campbell University of Illi

Add to Reading List

Source URL: choices.cs.uiuc.edu

Language: English - Date: 2007-08-19 18:00:31
648Internet standards / Network architecture / System administration / Multi-agent systems / Network management / Simple Network Management Protocol / Password / Telnet / Hacker / Computing / Internet protocols / Internet

TLP:  WHITE   CIS  CYBER  ALERT       To:  All  MS-­‐ISAC  and  Fusion  Center  Members   Date:  June  3,  2014   Subject:  Malicious  Cyber  Actor  T

Add to Reading List

Source URL: krebsonsecurity.com

Language: English - Date: 2014-06-05 09:44:04
649Deduction / Machine learning / Supervised learning / Entailment / Boosting / AdaBoost / Randomized algorithm / Logic / Ensemble learning / Learning

Learning large-margin halfspaces with more malicious noise Rocco A. Servedio Columbia University [removed]

Add to Reading List

Source URL: www.phillong.info

Language: English - Date: 2013-08-07 12:09:27
650Information Age / Information theory / Supervised learning / Science / Behavior / Learning / Machine learning / Communication / Cybernetics

active-malicious-CRC-short.dvi

Add to Reading List

Source URL: www.phillong.info

Language: English - Date: 2014-03-21 13:37:19
UPDATE