Security Analysis

Results: 6956



#Item
61

Survey of IPv6 Transition Technologies for Security Analysis Gábor LENCSE†,‡, and Youki KADOBAYASHI† †Laboratory for Cyber Resilience, Nara Institute of Science and TechnologyTakayama, Ikoma, Nara, 630-0

Add to Reading List

Source URL: www.hit.bme.hu

Language: English - Date: 2017-07-18 08:01:06
    62

    A Large-Scale Analysis of the Security of Embedded Firmwares Andrei Costin, Jonas Zaddach, Aur´elien Francillon and Davide Balzarotti EURECOM Sophia Antipolis France {name.surname}@eurecom.fr

    Add to Reading List

    Source URL: s3.eurecom.fr

    Language: English - Date: 2018-08-14 16:06:31
      63

      HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, and Suman Jana Department of Computer Science Columbia Univer

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-04-03 15:58:27
        64

        Side-Channel Analysis (SCA) – A comparative approach on smart cards, embedded systems, and high security solutions Rohde & Schwarz SIT GmbH Stuttgart/Germany

        Add to Reading List

        Source URL: www1.spms.ntu.edu.sg

        Language: English - Date: 2015-01-06 02:59:03
          65

          Hajime: Analysis of a decentralized internet worm for IoT devices Sam Edwards Ioannis Profetis Security Research Group

          Add to Reading List

          Source URL: security.rapiditynetworks.com

          Language: English - Date: 2016-10-18 00:57:22
            66

            The Strategic Analysis and Information Center (SAIC) integrates Ohio Homeland Security’s Infrastructure Protection Unit, Center for P-20 Safety & Security, Scrap Metal Program, the Ohio State Highway Patrol’s Compute

            Add to Reading List

            Source URL: publicsafety.ohio.gov

            Language: English - Date: 2017-11-21 14:17:57
              67

              Improving systems software security through program analysis and instrumentation THÈSE NOPRÉSENTÉE LE 27 MAI 2016 À LA FACULTÉ INFORMATIQUE ET COMMUNICATIONS

              Add to Reading List

              Source URL: dslab.epfl.ch

              Language: English - Date: 2018-08-14 09:29:24
                68

                Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA ⋆ Ling Song1,2,3 , Zhangjie Huang1,2( ) , Qianqian Yang1,2 1 State Key Laboratory of Information Security, Institute of Informati

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2017-07-03 21:45:35
                  69

                  SECURITY MONITORING & ALERTING SERVICES LOG MONITORING, ANALYSIS, THREAT INTELLIGENCE, & ALERT MANAGEMENT Enterprises can generate millions of log alerts every day, making the recognition and analysis of meaningful alert

                  Add to Reading List

                  Source URL: foresite.com

                  Language: English - Date: 2018-02-22 13:10:47
                    70

                    A Security Analysis of Police Computer Systems Benjamin VanderSloot∗ Stuart Wheaton∗ J. Alex Halderman

                    Add to Reading List

                    Source URL: benjaminvandersloot.com

                    - Date: 2018-03-26 16:16:53
                      UPDATE