Back to Results
First PageMeta Content
Software / Database management systems / Intrusion detection system / Secure communication / Electronic commerce / Multilevel security / Mandatory access control / XTS-400 / Snort / Computer security / Computer network security / System software


Detecting Hidden Logic Bombs in Critical Infrastructure Software
Add to Reading List

Document Date: 2012-03-26 14:41:48


Open Document

File Size: 1,00 MB

Share Result on Facebook

City

Washington / D.C. / Hoboken / Monterey / Chicago / /

Company

BAE Systems Information Technology Inc. / John Wiley and Sons / National Academy Press / MYSEA / /

/

Facility

Building Industry / National Institute of Standards and Technology / Building Trust / Fort George G. Meade / /

IndustryTerm

adaptive networks / individual network / enterprise security management / legacy networks / web browser / higher-sensitivity networks / client-server communications / unprivileged software / open source software / application-level services / singlelevel networks / trustworthy network / open source intrusion detection software / level networks / particular network / web-based user interface / extensible computing environment / detection systems / low sensitivity networks / cross-domain services / unmodified office productivity tools / interconnected sensitive and tactical networks / trusted services / software components / open-source products / application services / web interface / web-based services / protection services / software applications / respective network / intrusion monitoring devices / similar processing flow / web-based interface / application protocols / analysis tool / database services / Internet Protocol Router Network / /

NaturalFeature

Covert channel / /

OperatingSystem

XTS / Unix system / /

Organization

U.S. Department of Commerce DoD / office of Naval Research / U.S. Department of Commerce / National Computer Security Center / Open Information Security Foundation / Security Service / U.S. Department of Defense / National Institute of Standards and Technology / National Reconnaissance Office / Database Proxy Service / U.S. Department of Defense NAS / Common Criteria Maintenance Board / Defense Security Service / Naval Postgraduate School / National Academy of Sciences / Secure Session Service / Association for Computing Machinery / Department of Defense / National Academy of Sciences NCSC / /

Person

Thuy Nguyen / Timothy Levin / Woods Hole / Jean Khosalim / Prince / Mark Gondree / David Shifflett / /

Position

D. J. / DSS Manager / system administrator / guard / administrator / T. D. / Prince / security analyst / security administrator / analyst / /

Product

IDS / Apache / /

ProgrammingLanguage

SQL / PHP / /

ProvinceOrState

New Jersey / Illinois / /

Technology

IPS technologies / Information Technology / TCMs complement link encryption / flow control / database management system / LAN / IPv6 / PHP / relational database system / IP / streaming video / DBMS / application protocols / firewall / thin client / Unix system / VOIP / /

URL

http /

SocialTag