×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [malicious attacks]
Home >
malicious attacks
Information Security Awareness
158 views
STATISTICAL TECHNIQUES IN ANOMALY INTRUSION DETECTION SYSTEM
114 views
Heat seeking honeypot
112 views
Cyber crime presentation by HuNnY ButT
109 views
Securing mobile devices_in_the_business_environment
108 views
Wireless
468 views
Out of the Blue: Responding to New Zero-Day Threats
107 views
Robust Mesh Watermarking Emil Praun Hugues Hoppe Adam Finkelstein Emil Praun Hugues Hoppe Adam Finkelstein Princeton University Microsoft Research Princeton.
214 views
© 2010 IBM Corporation Security, Privacy and Regulations in the Cloud IBM Security Strategy September 29, 2011.
216 views
Cuckoo – Decentralized and Socio-Aware Online Microblogging Services Xiaoming Fu Computer Networks Group, Institute of Computer Science University of Göttingen,
212 views
Peer-to-peer and agent-based computing Security in Distributed Systems.
217 views
1 Overview. 2 Benefits of RATC Applications Real-time corrective Hour ahead corrective and preventive Day ahead corrective Day ahead market/economic based.
215 views
< Previous
Next >