<--- Back to Details
First PageDocument Content
Software / Database management systems / Intrusion detection system / Secure communication / Electronic commerce / Multilevel security / Mandatory access control / XTS-400 / Snort / Computer security / Computer network security / System software
Date: 2012-03-26 14:41:48
Software
Database management systems
Intrusion detection system
Secure communication
Electronic commerce
Multilevel security
Mandatory access control
XTS-400
Snort
Computer security
Computer network security
System software

Detecting Hidden Logic Bombs in Critical Infrastructure Software

Add to Reading List

Source URL: www.cisr.us

Download Document from Source Website

File Size: 1,00 MB

Share Document on Facebook

Similar Documents

The Case for Abstracting Security Policies    

The Case for Abstracting Security Policies   

DocID: 1qQWS - View Document

rim  NRL Report 8806 :f. rr

rim NRL Report 8806 :f. rr

DocID: 1a4eo - View Document

FriendStar: Extensible Web Applications with Information Flow Control Amit Levy Ali Mashtizadeh Stanford University  1

FriendStar: Extensible Web Applications with Information Flow Control Amit Levy Ali Mashtizadeh Stanford University 1

DocID: 19rum - View Document

A Security Model for Military Message Systems CARL E. LANDWEHR, CONSTANCE L. HEITMEYER, and JOHN McLEAN Naval Research Laboratory  Military systems that process classified information must operate in a secure manner; tha

A Security Model for Military Message Systems CARL E. LANDWEHR, CONSTANCE L. HEITMEYER, and JOHN McLEAN Naval Research Laboratory Military systems that process classified information must operate in a secure manner; tha

DocID: 198TO - View Document

CEE Nov12 Edn_Features.qxd

CEE Nov12 Edn_Features.qxd

DocID: 16YQT - View Document