Network security

Results: 23614



#Item
11Computing / Network architecture / Emerging technologies / Information and communications technology / Configuration management / Software-defined networking / Ethernet / OpenFlow / Computer architecture / Access control / Computer network / Network interface controller

Control-data plane intelligence trade-off in SDN Yash Sinha, Siddharth Bhatia Birla Institute of Technology and Science, Pilani, India Abstract— With the decoupling of network control and data

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 21:01:36
12Statistical classification / Coding theory / Computer arithmetic / Error detection and correction / Machine learning / Computing / Naive Bayes classifier / Learning / Advanced Encryption Standard / Block cipher / Bit array / Hamming

Practical Template-Algebraic Side Channel Attacks with Extremely Low Data Complexity Yossef Oren, Ofir Weisse and Avishai Wool Cryptography and Network Security Lab School of Electrical Engineering Tel-Aviv University, R

Add to Reading List

Source URL: www.ofirweisse.com

Language: English - Date: 2018-10-17 09:19:20
13

SoK: Exploiting Network Printers Jens Müller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk Horst Görtz Institute for IT-Security, Ruhr University Bochum , , juraj.so

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:58
    14

    CoreFlow: Enriching Bro security events using network traffic monitoring data Ralph Koninga,b,∗, Nick Buragliob , Cees de Laata,b , Paola Grossoa a Universiteit b Energy van Amsterdam, Science Park 904, Amsterdam, The

    Add to Reading List

    Source URL: delaat.net

    Language: English - Date: 2018-07-19 17:56:33
      15

      Privacy-Preserving Network Provenance Yuankai Zhang Adam O’Neill Georgetown University

      Add to Reading List

      Source URL: security.cs.georgetown.edu

      Language: English - Date: 2017-09-01 10:50:49
        16

        AFRICAN FOOD SECURITY URBAN NETWORK (AFSUN) THE SUPERMARKET REVOLUTION AND FOOD SECURITY IN NAMIBIA URBAN FOOD SECURITY SERIES NO. 26

        Add to Reading List

        Source URL: www.osf.org.za

        Language: English - Date: 2018-06-08 04:40:39
          17

          Network Resiliency and Security Playbook Prepared for The National Institute for Hometown Security November, 2017 Network Resiliency and Security Playbook | November 2017

          Add to Reading List

          Source URL: www.ctcnet.us

          Language: English - Date: 2018-04-09 16:11:51
            18

            Prevent your Company From Becoming the Next Security Breach Victim The Traditional Security Perimeter is Gone Sensitive data resides on mobile devices, cloud services, and other locations outside your network. Authorized

            Add to Reading List

            Source URL: goverifyid.com

            Language: English - Date: 2017-03-13 13:20:54
              19

              Proceedings of the Internet Society Network and Distributed System Security Symposium (NDSS 2001), February 2001, ppEfficient and Secure Source Authentication for Multicast Adrian Perrig 

              Add to Reading List

              Source URL: people.csail.mit.edu

              Language: English - Date: 2008-10-12 11:59:02
                20

                Network instruction Wireless network is prepared at the multi-purpose hall. Settings are as follows: SSID: emis2012 Password: emis2012matsue Supported wireless and security protocols are 802.11a/b/g with WEP(128bit),

                Add to Reading List

                Source URL: ribf.riken.go.jp

                - Date: 2012-12-01 22:57:34
                  UPDATE