×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [target victim]
Home >
target victim
Post Metasploitation
4.383 views
The Experiences of a Cyber Attack Victim
113 views
Anonymity for Continuous Data Publishing Benjamin C. M. Fung Concordia University Montreal, QC, Canada fung Ke Wang Simon.
217 views
Terrorist Targeting, Information, and Coalition Behavior Maurice Koster Ines Lindner Gordon McCormick Guillermo Owen.
218 views
Hey You, Get Off My Cloud: Exploring information Leakage in third party compute clouds T.Ristenpart, Eran Tromer, Hovav Shacham and Steven Savage ACM CCS.
222 views
Anonymizing Location-based data Jarmanjit Singh Jar_sing(at)encs.concordia.ca Harpreet Sandhu h_san(at)encs.concordia.ca Qing Shi q_shi(at)encs.concordia.ca.
216 views
Hey You, Get Off My Cloud: Exploring information Leakage in third party compute clouds
45 views
Anonymity for Continuous Data Publishing
41 views
Ira Wilsker's January 2014 Identity Theft Presentation
870 views