Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Attacks-Computer'
Attacks-Computer published presentations and documents on DocSlides.
Afghanistan Illegal Drug Trade
by ellena-manuel
LT Dan Ryan. Capt Steve Felts. Capt Bethany Kauff...
The Arab-Israeli Conflict
by min-jolicoeur
2000-Present. People/Things to Know. Hamas: A rad...
Combining Cryptographic Primitives to Prevent Jamming Attac
by myesha-ticknor
Abstract. The Open Nature of wireless medium leav...
Indirect File Leaks
by danika-pritchard
in Mobile Applications. Daoyuan Wu . and Rocky K....
Peer Attacks and Counter Attacks
by yoshiko-marsland
A Survey of P eer - to - Yu Yang and Lan Yang Com...
Seeing through Network-Protocol Obfuscation
by tatiana-dople
Liang Wang. 1. , Kevin P. Dyer. 2. , Aditya Akell...
E-Commerce
by mitsue-stanley
Emilee King. Introduction. Ecommerce.About.com de...
DDOS attacks in
by alexa-scheidler
an IPv6 . World. Tom . Paseka. HKNOG . 1.0 . Sept...
Stealthy Attacks on Pheromone Swarming Methods
by yoshiko-marsland
Janiece Kelly. , Texas State University . . ....
大資料裡的
by stefany-barnette
秘密. 從使用者、網路和應用程式的...
Aftermath of an Insurgent Attack
by ellena-manuel
Aftermath of an Insurgent Attack. Baghdad Church....
CS 142 Lecture Notes: Injection Attacks
by myesha-ticknor
Slide . 1. Unsafe Server Code. advisorName. = . ...
Trust
by jane-oiler
Amber McConahy. Trust. Multifaceted and . multidi...
Protecting Data on Smartphones & Tablets
by stefany-barnette
from Memory Attacks. Patrick . Colp. . Jiawen. ...
Security of
by marina-yarberry
virtual machines in . cloud environment. Rohit . ...
Terrorism and the media
by jane-oiler
First, what is terrorism?. Terrorism can be seen ...
How to protect your corporate from
by yoshiko-marsland
advanced attacks:. Microsoft . Advanced . Threat ...
Modern Network Security Threats
by myesha-ticknor
To protect assets!. Historically done through phy...
The Republic of Yemen
by lindy-dunigan
By: Jon Stenz and . Kaitlyn. Cochran . Capital: ...
GenoGuard: Protecting Genomic Data against Brute-Force Atta
by sherrill-nordquist
Zhicong Huang, Erman Ayday, Jacques Fellay, Jean-...
2011 Infrastructure Security Report
by conchita-marotz
7. th. Annual Edition. CE . Latinamerica. Carlo...
The Dark Menace:
by stefany-barnette
Characterizing . Network-based . Attacks in . the...
Enforcing Anonymity and Improving
by mitsue-stanley
Pseudonymity. in Tails. David . Wolinsky. Yale U...
‘ Y
by tatiana-dople
ou never think it will happen to you. It was just...
DES Analysis and Attacks
by ellena-manuel
CSCI 5857: Encoding and Encryption. Outline. Conf...
Safeguarding Innovation: Cybersecurity Challenges
by min-jolicoeur
Safeguarding Innovation: Cybersecurity Challenges ...
Cyber Security and Insurance Coverage: Evolving
by olivia-moreira
Cyber Security and Insurance Coverage: Evolving Ri...
AIMCOM2 Workshop Riding with AI towards
by myesha-ticknor
AIMCOM2 Workshop Riding with AI towards Mission-Cr...
Module 5 Threats Lesson Objectives Define threats
by min-jolicoeur
Module 5 Threats Lesson Objectives Define threats ...
DEVELOP Software Supply Chain Attacks can target
by conchita-marotz
DEVELOP Software Supply Chain Attacks can target p...
Last-Level Cache Side-Channel Attacks are
by phoebe-click
Last-Level Cache Side-Channel Attacks are Practica...
Ad Fraud: An Overview
by evander168
September 17, 2015. Ad fraud is (at least) a $6bil...
Overview of BD Security
by julian
ECE 493/593 Big Data Security. Why overview (not m...
Optimal Power Flow: Closing the Loop over Corrupted Data
by koen
André . Teixeira. , . Henrik. Sandberg, . Györg...
Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures Sungmin Hong, Lei Xu, Haopei Wang, Guofei Gu
by eliam396
Sungmin. Hong, Lei Xu, . Haopei. Wang, . Guofei....
Multiple forms of hate speech targeting women in online space
by kason
in online . space. Selma Muhič . DizdareviČ. INA...
Vestibular Function Across
by sergio
the Lifespan. David R. Friedland MD PhD. July 28-3...
Breathing Techniques from Yoga: Managing Asthma Naturally
by shophiajons
Asthma is a chronic respiratory condition that aff...
Cipherspaces /Darknets:
by beatrice
An . overview of attack strategies. Adrian Crensha...
A First Look at Zoombombing
by carny
Chen Ling1 , . Utkucan. Balcı2 , Jeremy Blackbur...
Load More...