Network Security

Results: 23614



#Item
1Cybercrime / Computer network security / Cyberwarfare / Computing / Spamming / Malware / Domain generation algorithm / Botnet / Web threat / Blacklist

A Lustrum of Malware Network Communication: Evolution and Insights Chaz Lever† , Platon Kotzias∗ , Davide Balzarotti∓ , Juan Caballero∗ , Manos Antonakakis‡ {chazlever,manos}@gatech.edu, davide.balzarotti@eurec

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:56:17
2Mobile technology / Technology / Information and communications technology / Mobile telecommunications / Computer network security / Femtocell / Wi-Fi / Anomaly detection / GSM / Generic Access Network / SMS / Network security

SEVENTH FRAMEWORK PROGRAMME Trustworthy ICT Project Title: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem

Add to Reading List

Source URL: mavroud.is

Language: English - Date: 2018-10-23 09:34:50
3Computing / Network architecture / Internet architecture / Internet / Routing / Internet Standards / Internet protocols / Forwarding plane / Router / Border Gateway Protocol / Open Shortest Path First / Multiprotocol Label Switching

The SCION Internet Architecture An Internet Architecture for the 21st Century David Barrera, Laurent Chuat, Adrian Perrig, Raphael M. Reischuk, Pawel Szalachowski Network Security Group, ETH Zurich, Switzerland March 6,

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
4Domain name system / Internet / Internet Standards / Network architecture / Computing / Domain Name System Security Extensions / Name server / Domain name / Root name server / WHOIS / Fully qualified domain name / Second-level domain

A Paged Domain Name System for Query Privacy Daniele E. Asoni, Samuel Hitz, and Adrian Perrig Network Security Group Department of Computer Science, ETH Zürich {daniele.asoni,samuel.hitz,adrian.perrig}@inf.ethz.ch

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
5Cybercrime / Computer security / Cyberwarfare / Security engineering / Computer network security / Cyberspace / National security / Denial-of-service attack / Cyberattack / Network security

CALL FOR PAPERS Special Issue of the International Journal on Network Management (IJNM) on Measure, Detect and Mitigate – Challenges and Trends in Network Security Publication: September 2015

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2014-09-02 00:52:00
6Computing / Software / System software / Computer network security / Wireless networking / IEEE 802.11 / Web scraping / Wireshark / Pcap / Aircrack-ng / Packet analyzer / Transmission Control Protocol

EECS 388 Intro to Computer Security October 14, 2016 Project 3: Network Security

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:22
7Artificial neural networks / Computational neuroscience / Applied mathematics / Cybernetics / Neuroscience / Convolutional neural network / Long short-term memory / Recurrent neural network / Artificial intelligence

Poster: Summarized Network Behavior Prediction Shih-Chieh Su∗ Qualcomm Inc. San Diego, CA, 92121 Email: ∗

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-26 01:29:24
8Machine learning / Learning / Artificial intelligence / Covariance and correlation / Data analysis / Dimension reduction / Anomaly detection / Data mining / Data security / Principal component analysis / Pearson correlation coefficient / Correlation and dependence

SEVENTH FRAMEWORK PROGRAMME Trustworthy ICT Project Title: Enhanced Network Security for Seamless Service Provisioning

Add to Reading List

Source URL: mavroud.is

Language: English - Date: 2018-10-23 09:34:50
9Security / Prevention / Computer security / Security breaches / Crime prevention / Cryptography / National security / Security breach notification laws / Vulnerability / Internet privacy / Privacy / Password policy

0760 NETWORK SECURITY POLICY PRIVACY POLICIES Collective Medical Technologies, Inc. Objective This Security Policy (“Policy”) applies to all Services provided by Collective Medical Technologies, Inc. (“CMT”)

Add to Reading List

Source URL: www.collectivemedicaltech.com

Language: English - Date: 2018-03-20 02:31:48
UPDATE