×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [attack models]
ИБ_графики
208 views
Information Security of Embedded Systems 9.1.2010: Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST
213 views
2009-03-16 1 Countering DoS Attacks with Stateless Multipath Overlays Presented by Yan Zhang
214 views
Article on The Electronic Health Record
190 views
1 Architectural Support for Copy and Tamper- Resistant Software David Lie Computer Systems Laboratory Stanford University
216 views
Procurement Group Topic Presentation The USN and USMC Procurement of F/A-18 Hornet Mark Seeber Ben Wiltsie John Aune Fall 2004, University of Minnesota
218 views
Panagiotis Rizomiliotis and Stefanos Gritzalis Dept. of Information and Communication Systems Engineering University of the Aegean, Greece GHB#: A Provably
215 views
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense
35 views
Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition
55 views
Security Models: Dolev-Yao, Semantic Security, Probabilistic Encryption and ZKIP
23 views
15-August-2000AT&T Network Security and Intrusion Detection Survey of the Art and Practice Dr. Michah Lerner AT&T Labs 15-August-2000
218 views
Public-Key Encryption in the B ounded- R etrieval M odel
28 views
Next >