Security Patterns

Results: 182



#Item
11Natural environment / Food and drink / Sustainability / Food politics / Environmentalism / Sustainable food system / Vegetarianism / Food security / Sustainable consumption / Sustainable diet / Sustainable development / Agriculture

THE CRITICAL ROLE OF GLOBAL FOOD CONSUMPTION PATTERNS IN ACHIEVING SUSTAINABLE FOOD SYSTEMS AND FOOD FOR ALL

Add to Reading List

Source URL: fletcher.tufts.edu

Language: English - Date: 2013-11-06 16:22:29
12Face recognition / Surveillance / Machine learning / Feature detection / Local binary patterns / Facial recognition system / Demography of the United States / Face detection / Biometrics / Cohort / Statistical classification

To appear: IEEE Transactions on Information Forensics and Security Face Recognition Performance: Role of Demographic Information Brendan F. Klare, Member, IEEE, Mark J. Burge, Senior Member, IEEE, Joshua C. Klontz, Rich

Add to Reading List

Source URL: openbiometrics.org

Language: English - Date: 2016-08-02 16:53:35
13Computer security / Hacking / Software testing / Computer network security / Attack patterns / Recommender system / Text mining / Event correlation / Data mining / CAPEC / Intrusion detection system / Information security operations center

Mining known attack patterns from security-related events Nicandro Scarabeo1,2 , Benjamin C.M. Fung3 and Rashid H. Khokhar4 1 Department of Electrical and Information Engineering, University of Cassino and Southern Lazi

Add to Reading List

Source URL: peerj.com

Language: English - Date: 2015-10-07 04:49:41
14

Institute for Cyber Security Access Control for Online Social Networks using Relationship Type Patterns Dissertation Defense Yuan Cheng

Add to Reading List

Source URL: profsandhu.com

Language: English - Date: 2014-05-05 18:57:24
    15

    EXECUTIVE SUMMARY This review, based largely on work in the ILO’s Socio-Economic Security (SES) Programme, aims to provide a picture of the emerging patterns of economic security across the world. It draws primarily o

    Add to Reading List

    Source URL: www.ilo.org

    Language: English - Date: 2004-08-30 07:12:00
      16Group processes / Development economics / Welfare economics / Dichotomies / Discrimination / Ingroups and outgroups / Human security / Poverty / Economic inequality / Economic growth

      BEHAVIORAL AND BRAIN SCIENCES, 465–521 doi:S0140525X12002828 Climato-economic habitats support patterns of human needs, stresses, and freedoms

      Add to Reading List

      Source URL: motyl.people.uic.edu

      Language: English - Date: 2014-09-18 20:16:30
      17Economy / Academia / Prevention / Security engineering / Privacy / Internet privacy / Password / Authentication / Software design pattern / Security Patterns / Pattern language / Consumer privacy

      Privacy Design Patterns and Anti-Patterns Patterns Misapplied and Unintended Consequences Nick Doty Mohit Gupta

      Add to Reading List

      Source URL: cups.cs.cmu.edu

      Language: English - Date: 2013-07-23 08:07:23
      18IP address / Transmission Control Protocol / Computing / Cyberwarfare / Application firewall / Computer security / Attack patterns

      Poster: An Automatic Multi-Step Attack Pattern Mining Approach for Massive WAF Alert Data Yang Zhang1,2 , Tingwen Liu1,2 , Jinqiao Shi1,2 , Panpan Zhang1,2 , Haoliang Zhang1,2 , Jing Ya1,2 1 Institute of Information Eng

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2015-05-11 16:42:24
      19Software testing / Software bugs / Hacking / Source code / Vulnerability / Attack patterns / Application security / Cross-site scripting / Code injection / Cyberwarfare / Computer security / Computing

      Microsoft Word - tcm_taxonomy_submission.doc

      Add to Reading List

      Source URL: cwe.mitre.org

      Language: English - Date: 2006-09-13 14:57:23
      20Software testing / Hacking / Relational database management systems / Database management systems / Attack patterns / SQL injection / Vulnerability / Code injection / Buffer overflow / Cyberwarfare / Computing / Computer security

      CWECWE/SANS Top 25 Most Dangerous Software Errors

      Add to Reading List

      Source URL: cwe.mitre.org

      Language: English - Date: 2012-09-25 15:14:33
      UPDATE