Search alternatives:
attacker technical » attackers technical, attacks technical, attacker techniques
technical paper » technical papers
world attacker » world attack, world attacks, word attack

1
by Wodon, Quentin
Published 2001
World Bank
Subjects: ...International Movement ATD Fourth World...

2
Published 2024
Springer Nature Switzerland
Table of Contents: ...Who is the attacker - Analyzing data protection violations in health care -- Towards privacy...

3
Published 2021
Springer Nature Singapore
Table of Contents: ... Deep Neural Network -- Injecting power attacks with voltage glitching and generation of clock attacks...

4
Published 2017
Springer International Publishing
Table of Contents: ... as an efficient way to attack real networks -- From particles to complex matter -- Chemical garden -- Assembly...

5
Published 1997
Springer Berlin Heidelberg
...­ um on Operations Research (SOR 96). The Symposium took place at the Technical University...

6
Published 2002
Springer Berlin Heidelberg
Table of Contents: ...-World?) Peer-to-Peer Scientific Collaborations -- Complex Queries in DHT-based Peer-to-Peer Networks...

7
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... Detection for Intrusion Prevention on the Network Card -- Defending Against Injection Attacks Through...

8
Published 2017
Springer International Publishing
Table of Contents: ... Network Approach -- Replay attack impact on Advanced Metering Infrastructure (AMI) -- D2Sketch: Supporting...

9
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Union -- Inkjet-Printed Paper-Based RFID and Nanotechnology-Based Ultrasensitive Sensors: The “Green...

10
Published 2001
Springer Berlin Heidelberg
Table of Contents: ...Modeling Attacks -- From Declarative Signatures to Misuse IDS -- Logging and IDS Integration...

11
Published 2009
Vieweg+Teubner Verlag
Table of Contents: ... -- Technical Issues with Trust in Computing and Proposed Solutions -- Implementing a Portable Trusted...

12
Published 2007
Springer London
Table of Contents: ...Best Technical Paper -- Combining Task Execution and Background Knowledge for the Verification...

13
Published 2013
Springer India
Table of Contents: ... and Development -- Labour and Energy Intensity: A Study of Pulp & Paper Industries in India -- Impact...

14
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... Policy -- Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks...

15
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... Honeypots -- Vulnerability Assessment and Exploit Analysis -- Automatic Detection of Attacks...

16
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... -- Who on Earth Is “Mr. Cypher”: Automated Friend Injection Attacks on Social Networking Sites...

17
Published 1994
Springer Berlin Heidelberg
Table of Contents: ... Degree for Reduction Attacks -- Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic...

18
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... Checking with Modified CRLs -- E-Passports as a Means Towards the First World-Wide Public Key...

19
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... in Auctions -- Short Papers -- Agent Environment and Knowledge inDistributed Join Calculus -- Agent-Based...

20
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... -- Universal JPEG Steganalysis in the Compressed Frequency Domain -- Attack on JPEG2000 Steganography Using...