Security Analysis

Results: 6956



#Item
21

Massive Distributed and Parallel Log Analysis For Organizational Security Xiaokui Shu, John Smiy, Danfeng (Daphne) Yao, and Heshan Lin Department of Computer Science Virginia Tech Blacksburg, VirginiaEmails: {subx

Add to Reading List

Source URL: people.cs.vt.edu

Language: English - Date: 2013-11-20 11:50:22
    22

    TESTING CRYPTOGRAPHIC SECURITY IN YOUR APPLICATIONS Cryptosense provides state-of-the-art analysis software to help some of the world’s largest organizations eliminate the vulnerabilities caused by crypto misuse in the

    Add to Reading List

    Source URL: cryptosense.com

    Language: English - Date: 2017-10-03 09:47:46
      23

      MARCH 19, 2018 | CONCORD, NH New England’s Changing Resource Mix and the ISO’s Analysis of Fuel-Security Risks New Hampshire Residential Ratepayer

      Add to Reading List

      Source URL: www.oca.nh.gov

      Language: English - Date: 2018-03-26 11:03:36
        24

        A Large-Scale Analysis of the Security of Embedded Firmwares Andrei Costin, Jonas Zaddach, Aur´elien Francillon and Davide Balzarotti EURECOM Sophia Antipolis France {name.surname}@eurecom.fr

        Add to Reading List

        Source URL: www.s3.eurecom.fr

        Language: English - Date: 2018-08-15 14:28:54
          25

          ARM: ANN-based Ranking Model for Privacy and Security Analysis in Smartphone Ecosystems Majid Hatamian∗ , Jetzabel Serna∗ ∗ Chair of Mobile Business & Multilateral Security

          Add to Reading List

          Source URL: privacyus.eu

          Language: English - Date: 2017-11-10 05:13:34
            26

            Analysis of the Communications Security Establishment Act and Related Provisions in Bill C-59 (An Act respecting national security matters), First Reading (December 18, December 2017

            Add to Reading List

            Source URL: citizenlab.ca

            Language: English - Date: 2018-01-03 15:44:40
              27

              Exercise 4 Smart Contracts Program Analysis for System Security and Reliability 2018 ETH Zurich March 24, 2018

              Add to Reading List

              Source URL: www.sri.inf.ethz.ch

              Language: English - Date: 2018-05-15 09:28:46
                28

                Timing-Sensitive Information Flow Analysis for Synchronous Systems Boris K¨opf and David Basin Information Security ETH Zurich, Switzerland {bkoepf,basin}@inf.ethz.ch

                Add to Reading List

                Source URL: software.imdea.org

                Language: English - Date: 2010-09-02 11:11:48
                  29

                  A Security Analysis of Honeywords Ding Wang, Haibo Cheng, Ping Wang, Jeff Yan, Xinyi Huang Password

                  Add to Reading List

                  Source URL: wp.internetsociety.org

                  Language: English - Date: 2018-03-01 13:38:27
                    30

                    FAIR: Fuzzy Alarming Index Rule for Privacy Analysis in Smartphone Apps Majid Hatamian1? , Jetzabel Serna1 , Kai Rannenberg1 and Bodo Igler2 1 Chair of Mobile Business and Multilateral Security

                    Add to Reading List

                    Source URL: www.m-chair.de

                    Language: English - Date: 2017-10-05 10:18:54
                      UPDATE