Transmission security

Results: 1396



#Item
111Application programming interfaces / Communications protocol / Data transmission / Protocols / Monad / Distributed computing / Operating system / X Window System / Transmission Control Protocol / Computing / Software / Data

Poster: Contract Verification for Mobile Security Hannah Gommerstadt Frank Pfenning Limin Jia

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:44
112Spamming / Data / Information / Communications protocol / Data transmission / Protocols / Reverse engineering / Botnet / Robustness / Computer network security / Computing / Multi-agent systems

«Recents evolutions of Netzob » OSSIR Bretagne April

Add to Reading List

Source URL: www.netzob.org

Language: English - Date: 2015-04-21 11:46:12
113Computing / Domain name system / Port / Transmission Control Protocol / Name server / DNS spoofing / Dan Kaminsky / Internet / Network architecture / Internet protocols

JPJ8;D@E Security Lessons K_\jf]kZ_\npZ\ek\if]k_\@ek\ie\k

Add to Reading List

Source URL: www.linux-magazine.com

Language: English
114Technology / Electric power distribution / Emerging technologies / Smart grid / European Network and Information Security Agency / Smart meter / Cyberwarfare / Electrical grid / Electric power transmission / Energy / Electromagnetism / Electric power transmission systems

1 Appropriate security measures for smart grids Guidelines to assess the sophistication of security measures implementation]

Add to Reading List

Source URL: www.cockpitci.eu

Language: English - Date: 2014-03-25 07:46:38
115Evaluation / Emerging technologies / Technology / Computer security / Cyber security standards / Cyberwarfare / Ambient intelligence / Smart grid / Certification / Standards / Electric power transmission systems / Security

Sensus First AMI Vendor to Recieve Achilles Practices Certification February 14, 2011 Sensus is the first Advanced Metering Infrastructure (AMI) company to achieve overall cyber security certification after an eight-mont

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:14
116Pcap / Tcpdump / Wireshark / Network Driver Interface Specification / Firewall / Packet capture / Architecture of Windows NT / Transmission Control Protocol / Kernel / Software / Computer network security / Berkeley Packet Filter

An Architecture for High Performance Network Analysis Fulvio Risso and Loris Degioanni Dipartimento di Automatica e Informatica – Politecnico di Torino Corso Duca degli Abruzzi, 24 – 10129 Torino, Italy {risso,degio

Add to Reading List

Source URL: www.winpcap.org

Language: English - Date: 2010-09-05 10:10:56
117Physics / Monte Carlo method / AC power / Delft University of Technology / High-voltage direct current / Transmission system operator / Electrical grid / Electric power system / Electric power / Energy / Electromagnetism

Speeding up a Risk-based Security Assessment Method for Electrical Power Systems In collaboration with: Ir. M. de Jong, Dr. G. Papaefthymiou, Dr. D. Lahaye, Prof. C. Vuik Background

Add to Reading List

Source URL: ta.twi.tudelft.nl

Language: English - Date: 2015-03-07 10:17:44
118Labor economics / Socioeconomics / Social security / Unemployment benefits / Unemployment / Insurance / Economic indicator / Economics / Labour law / Social programs

News Release Connect with DOL at http://blog.dol.gov TRANSMISSION OF MATERIALS IN THIS RELEASE IS EMBARGOED UNTIL

Add to Reading List

Source URL: www.dol.gov

Language: English - Date: 2015-06-11 07:46:37
119

2001 Paper 8 Question 6 Security In the Wired Equivalent Privacy protocol used in IEEEnetworks, data are protected at the link level during transmission on a wireless LAN. Each frame has a 32-bit CRC appended to

Add to Reading List

Source URL: www.cl.cam.ac.uk

- Date: 2014-06-09 10:17:42
    120Signal processing / Electronic test equipment / Data transmission / Data security / Wireless networking / Vector signal analyzer / Phase-shift keying / Baseband / IEEE 802.11 / Telecommunications engineering / Electronic engineering / Technology

    Active Attacks Against Modulation-based Radiometric Identification RPI Department of Computer Science Technical ReportMatthew Edman and B¨ ulent Yener

    Add to Reading List

    Source URL: www.cs.rpi.edu

    Language: English - Date: 2009-08-03 15:32:20
    UPDATE