Search Results
2. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
3. The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security
4. The SPARCHS Project: Hardware Support for Software Security
5. Automating the Injection of Believable Decoys to Detect Snooping
6. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
7. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
8. Ethics in Security Vulnerability Research
9. A Network Access Control Mechanism Based on Behavior Profiles
10. Baiting Inside Attackers Using Decoy Documents
- « Previous
- Next »
- 1
- 2
- 3
- 4