Attack model

Results: 101



#Item
51Revisiting the Security Model for Timed-Release Encryption with Pre-Open Capability Alexander W. Dent1 and Qiang Tang1,2 1  2

Revisiting the Security Model for Timed-Release Encryption with Pre-Open Capability Alexander W. Dent1 and Qiang Tang1,2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-06-28 10:39:30
52What makes flies attack? 23 November 2010 School, used Drosophila as a model system in which to address this question. In fruit flies, sex is cell specific, yet the sex of cells and tissues can be changed by altering the

What makes flies attack? 23 November 2010 School, used Drosophila as a model system in which to address this question. In fruit flies, sex is cell specific, yet the sex of cells and tissues can be changed by altering the

Add to Reading List

Source URL: phys.org

Language: English - Date: 2015-02-08 11:34:45
53Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains Eric M. Hutchins∗, Michael J. Cloppert†, Rohan M. Amin, Ph.D.‡ Lockheed Martin Corporation

Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains Eric M. Hutchins∗, Michael J. Cloppert†, Rohan M. Amin, Ph.D.‡ Lockheed Martin Corporation

Add to Reading List

Source URL: papers.rohanamin.com

Language: English - Date: 2011-08-10 17:29:42
54ABSTRACT FOR A PRESENTATION ON  Assessing the Contribution of Cyber-Attacks to Military Operations: Applying the Value Creation / Value Destruction Model in a Non-Monetary Context by Scott Borg Director and Chief Economi

ABSTRACT FOR A PRESENTATION ON Assessing the Contribution of Cyber-Attacks to Military Operations: Applying the Value Creation / Value Destruction Model in a Non-Monetary Context by Scott Borg Director and Chief Economi

Add to Reading List

Source URL: usacac.army.mil

Language: English - Date: 2008-10-02 13:11:53
55Pervasive Attack: 
 A Threat Model !  draft-barnes-pervasive-problem-00

Pervasive Attack: 
 A Threat Model ! draft-barnes-pervasive-problem-00

Add to Reading List

Source URL: down.dsg.cs.tcd.ie

- Date: 2014-03-01 03:17:05
    56draft-barnes-pervasive-problem-00 - Pervasive Attack: A Threat Model and Problem Statement

    draft-barnes-pervasive-problem-00 - Pervasive Attack: A Threat Model and Problem Statement

    Add to Reading List

    Source URL: www.w3.org

    Language: English - Date: 2014-02-07 14:41:45
    57Microsoft Word - Type 1 Report[removed]

    Microsoft Word - Type 1 Report[removed]

    Add to Reading List

    Source URL: health.hawaii.gov

    Language: English - Date: 2014-10-07 23:22:40
    58Growing season averages and extremes of the time to ignition for lodgepole pine foliage across the early stages of an MPB attack.

    Growing season averages and extremes of the time to ignition for lodgepole pine foliage across the early stages of an MPB attack.

    Add to Reading List

    Source URL: wfdss.usgs.gov

    Language: English - Date: 2014-09-11 10:10:36
    59White Paper  Addressing the Full Attack Continuum: Before, During, and After an Attack It’s Time for a New Security Model Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that

    White Paper Addressing the Full Attack Continuum: Before, During, and After an Attack It’s Time for a New Security Model Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that

    Add to Reading List

    Source URL: www.cisco.com

    Language: English
    60Flight and Space (PLTW) Primary Career Cluster: Science, Technology, Engineering, and Mathematics (STEM)

    Flight and Space (PLTW) Primary Career Cluster: Science, Technology, Engineering, and Mathematics (STEM)

    Add to Reading List

    Source URL: tn.gov

    Language: English - Date: 2014-09-02 12:43:35