Security Analysis

Results: 6956



#Item
71

Secure Water Treatment Testbed (SWaT): An Overview Kaung Myat Aung Laboratory Engineer, iTrust Original: October 14, 2015. Updated: October 15, 2015 Model-Based Security Analysis

Add to Reading List

Source URL: groups.csail.mit.edu

- Date: 2016-02-21 10:27:29
    72

    Yale University Department of Computer Science Security Analysis of Accountable Anonymous Group Communication in Dissent Ewa Syta Aaron Johnson

    Add to Reading List

    Source URL: www.nrl.navy.mil

    - Date: 2013-05-28 10:05:55
      73

      Neither Snow Nor Rain Nor MITMAn Empirical Analysis of Email Delivery Security Zakir Durumeric† David Adrian† Ariana Mirian† James Kasten† Elie Bursztein‡ Nicolas Lidzborski‡ Kurt Thomas‡ Vijay Erant

      Add to Reading List

      Source URL: arianamirian.com

        74

        A Securities Law Framework for Blockchain Tokens - WishFinance Platfrom Token (WSH) To estimate how likely a particular blockchain token is be a security under US federal securities law Refer to: full legal analysis Elem

        Add to Reading List

        Source URL: wishfinance.com

        - Date: 2018-03-27 14:14:25
          75

          The Design and Analysis of Cryptographic Application Programming Interfaces for Security Devices

          Add to Reading List

          Source URL: www.icon.co.za

          - Date: 2003-02-26 09:09:14
            76

            Security Analysis of Cache Replacement Policies Pablo Ca˜ nones1 , Boris K¨opf1 , and Jan Reineke2 1 arXiv:1701.06481v1 [cs.CR] 23 Jan 2017

            Add to Reading List

            Source URL: arxiv.org

            - Date: 2017-01-23 20:44:45
              77

              National Protection and Programs Directorate Office of Cyber and Infrastructure Analysis (OCIA) Critical Infrastructure Security and Resilience Note CONSEQUENCES TO SEAPORT OPERATIONS FROM MALICIOUS CYBER ACTIVITY

              Add to Reading List

              Source URL: info.publicintelligence.net

              - Date: 2016-09-11 19:09:27
                78

                Poster: Secure Multi-Party Computation as a Tool for Privacy-Preserving Data Analysis Samuel Havron University of Virginia

                Add to Reading List

                Source URL: www.ieee-security.org

                - Date: 2016-05-18 07:17:44
                  79

                  Security Analysis of Emerging Smart Home Applications Earlence Fernandes Jaeyeon Jung Atul Prakash

                  Add to Reading List

                  Source URL: cdn2.vox-cdn.com

                  - Date: 2016-04-29 17:40:48
                    80

                    Security Analysis of the Diebold AccuVote-TS Voting Machine Ariel J. Feldman* , J. Alex Halderman* , and Edward W. Felten*,† * Center for Information Technology Policy and Dept. of Computer Science, Princeton Universit

                    Add to Reading List

                    Source URL: www.usenix.org

                    - Date: 2007-07-03 10:25:07
                      UPDATE