Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Computer attack")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 1294

  • Page / 52
Export

Selection :

  • and

Pointer Tainting Still Pointless (but we all see the point of tainting)SLOWINSKA, Asia; BOS, Herbert.Operating systems review. 2010, Vol 44, Num 3, pp 88-92, issn 0163-5980, 5 p.Article

Antiphishing through Phishing Target DiscoveryLIU WENYIN; GANG LIU; BITE QIU et al.IEEE internet computing. 2012, Vol 16, Num 2, pp 52-60, issn 1089-7801, 9 p.Article

Cybercrime 2.0 : When the Cloud Turns DarkPROVOS, Niels; MOHEEB ABU RAJAB; MAVROMMATIS, Panayiotis et al.Communications of the ACM. 2009, Vol 52, Num 4, pp 42-47, issn 0001-0782, 6 p.Article

3 : Les menaces qui pèsent sur Internet : Web 3.0 L'Avenir d'InternetLa Recherche (Imprimé). 2007, Num 413, pp 40-41, issn 0029-5671, 2 p.Article

Efficient collision search attacks on SHA-OXIAOYUN WANG; HONGBO YU; YIN, Yiqun Lisa et al.Lecture notes in computer science. 2005, pp 1-16, issn 0302-9743, isbn 3-540-28114-2, 1Vol, 16 p.Conference Paper

The State of Phishing AttacksJASON HONG.Communications of the ACM. 2012, Vol 55, Num 1, pp 74-81, issn 0001-0782, 8 p.Article

Finding collisions in the full SHA-1XIAOYUN WANG; YIN, Yiqun Lisa; HONGBO YU et al.Lecture notes in computer science. 2005, pp 17-36, issn 0302-9743, isbn 3-540-28114-2, 1Vol, 20 p.Conference Paper

On the Collision Resistance of RIPEMD-160MENDEL, Florian; PRAMSTALLER, Norbert; RECHBERGER, Christian et al.Lecture notes in computer science. 2006, pp 101-116, issn 0302-9743, isbn 3-540-38341-7, 1Vol, 16 p.Conference Paper

Collisions of SHA-0 and reduced SHA-1BIHAM, Eli; RAFI CHEN; JOUX, Antoine et al.Lecture notes in computer science. 2005, pp 36-57, issn 0302-9743, isbn 3-540-25910-4, 22 p.Conference Paper

Protect your library's computersZIMERMAN, Martin.New library world. 2010, Vol 111, Num 1272-3, pp 203-212, issn 0307-4803, 10 p.Article

Viewpoint Cyber-victimization and Cybersecurity in ChinaKSHETRI, Nir.Communications of the ACM. 2013, Vol 56, Num 4, pp 35-37, issn 0001-0782, 3 p.Article

Hardware Designer's Guide to Fault AttacksKARAKLAJIC, Duško; SCHMIDT, Jörn-Marc; VERBAUWHEDE, Ingrid et al.IEEE transactions on very large scale integration (VLSI) systems. 2013, Vol 21, Num 12, pp 2295-2306, issn 1063-8210, 12 p.Article

Detection of Distributed Attacks Based on Hybrid Neural NetworksMARKAROV, V; GHAZARYAN, A.Security & management. International conferenceWorldComp'2010. 2010, pp 589-593, isbn 1-60132-159-7 1-60132-162-7 1-60132-163-5, 5 p.Conference Paper

Botnets, la menace invisible = Botnets, the invisible threatVEYSSET, Franck; BUTTI, Laurent.Techniques de l'ingénieur. Sécurité des systèmes d'information. 2009, Vol SI1, Num H5335, issn 1953-4663, H5335.1-H5335.24, doc.H5335.1 [25 p.]Article

A Proposal for an Integrated Memory Acquisition MechanismLIBSTER, Eugene; KORNBLUM, Jesse D.Operating systems review. 2008, Vol 42, Num 3, pp 14-20, issn 0163-5980, 7 p.Article

Construction of 1-Resilient Boolean Functions with Very Good NonlinearityMAITY, Soumen; ARACKAPARAMBIL, Chrisil; MEYASE, Kezhasono et al.Lecture notes in computer science. 2006, pp 417-431, issn 0302-9743, isbn 3-540-44523-4, 1Vol, 15 p.Conference Paper

Hardware Stack Design : Towards an Effective Defence Against Frame Pointer Overwrite AttacksPARK, Yongsu; LEE, Younho; KIM, Heeyoul et al.Lecture notes in computer science. 2006, pp 268-277, issn 0302-9743, isbn 3-540-47699-7, 1Vol, 10 p.Conference Paper

Template attacks on masking-resistance is futileOSWALD, Elisabeth; MANGARD, Stefan.Lecture notes in computer science. 2006, pp 243-256, issn 0302-9743, isbn 978-3-540-69327-7, 1Vol, 14 p.Conference Paper

On highly nonlinear S-boxes and their inability to thwart DPA attacksCARLET, Claude.Lecture notes in computer science. 2005, pp 49-62, issn 0302-9743, isbn 3-540-30805-9, 1Vol, 14 p.Conference Paper

An effective attack on the quantum key distribution protocol based on quantum encryptionFEI GAO; QIN, Su-Juan; WEN, Qiao-Yan et al.Lecture notes in computer science. 2005, pp 302-312, issn 0302-9743, isbn 3-540-30855-5, 1Vol, 11 p.Conference Paper

The boomerang attack on 5 and 6-round reduced AESBIRYUKOV, Alex.Lecture notes in computer science. 2005, pp 11-15, issn 0302-9743, isbn 3-540-26557-0, 5 p.Conference Paper

Targeted Cyberattacks: A Superset of Advanced Persistent ThreatsSOOD, Aditya K; ENBODY, Richard J.IEEE security & privacy. 2013, Vol 11, Num 1, pp 54-61, issn 1540-7993, 8 p.Article

Social phishingJAGATIC, Tom N; JOHNSON, Nathaniel A; JAKOBSSON, Markus et al.Communications of the ACM. 2007, Vol 50, Num 10, pp 94-100, issn 0001-0782, 7 p.Article

Collisions and Near-Collisions for Reduced-Round TigerKELSEY, John; LUCKS, Stefan.Lecture notes in computer science. 2006, pp 111-125, issn 0302-9743, isbn 3-540-36597-4, 1Vol, 15 p.Conference Paper

Key Substitution Attacks on Multisignature Schemes : Cryptography and Information SecurityBENNIAN DOU; HONG ZHANG; CHEN, Chun-Hua et al.IEICE transactions on fundamentals of electronics, communications and computer science. 2013, Vol 96, Num 1, pp 244-245, issn 0916-8508, 2 p.Article

  • Page / 52