Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Computer security conference 21 found (44 total)

alternate case: computer security conference

David Elliott Bell (713 words) [view diff] case mismatch in snippet view article find links to article

"Trusted Xenix Interpretation: Phase 1". At the 13th National Computer Security Conference. The two papers Bell published in 1991 and 1992, "Lattices, Policies
Intrusion detection system (5,578 words) [view diff] case mismatch in snippet view article find links to article
Systems in Intrusion Detection: A Case Study," The 11th National Computer Security Conference, October, 1988 Smaha, Stephen E., "Haystack: An Intrusion Detection
Defcon Robot Contest (516 words) [view diff] exact match in snippet view article find links to article
was a robotics competition which was held at the annual Defcon computer security conference in Las Vegas. The first competition was held at Defcon 11 in
Role-based access control (2,300 words) [view diff] case mismatch in snippet view article find links to article
(October 1992). "Role-Based Access Control" (PDF). 15th National Computer Security Conference: 554–563. Sandhu, R., Coyne, E.J., Feinstein, H.L. and Youman
Father Christmas (computer worm) (408 words) [view diff] case mismatch in snippet view article
(June 1989). "The "Father Christmas" Worm" (PDF). 12th National Computer Security Conference Proceedings. Retrieved November 23, 2015. Nazario, Joe (2004)
Information wants to be free (1,219 words) [view diff] case mismatch in snippet view article find links to article
Break into Computer Systems", Proceedings of the 13th National Computer Security Conference, Washington, DC: Georgetown, pp. 653–64. KEVIN POULSEN AND KIM
Sir Dystic (595 words) [view diff] no match in snippet view article find links to article
Retrieved 18 May 2006. Pennington, Sylvia. "Hackers hold key to computer security, conference told Archived 2007-03-12 at the Wayback Machine." vnunet.com
Phrack (1,479 words) [view diff] case mismatch in snippet view article find links to article
and gossip among the hacker community. In the 1990 National Computer Security Conference, Sheldon Zenner and Dorothy Denning suggested that Phrack articles
Type enforcement (610 words) [view diff] case mismatch in snippet view article find links to article
to Hierarchical Integrity Policies, In Proceedings of the 8th National Computer Security Conference, page 18, 1985. LOCK - A trusted computing system
Trusted Computer System Evaluation Criteria (2,101 words) [view diff] case mismatch in snippet view article find links to article
Dan Edwards, Roger Schell, and Marvin Schaeffer of National Computer Security Conference; and Ted Lee of Univac. A number of people from government, government
AGDLP (947 words) [view diff] case mismatch in snippet view article find links to article
(October 1992). "Role Based Access Control" (PDF). 15th National Computer Security Conference. pp. 554–563. Sandhu, R.; Coyne, E.J.; Feinstein, H.L.; Youman
DNA Lounge (2,971 words) [view diff] exact match in snippet view article find links to article
hacker con), Ignite (a technology conference), and BSidesSF (a computer security conference). The release of Mozilla 1.0 was celebrated there in 2002, and
Medtronic (4,640 words) [view diff] case mismatch in snippet view article find links to article
a security vulnerability in a Medtronic insulin pump at the Computer Security conference Black Hat Briefings, allowing an attacker to take control of
Biswanath Mukherjee (1,292 words) [view diff] case mismatch in snippet view article find links to article
[citation needed] 1994: Co-winner, Paper Award, 17th National Computer Security Conference, for the paper "Testing Intrusion Detection Systems: Design Methodologies
Protection ring (3,626 words) [view diff] case mismatch in snippet view article find links to article
Alternative to Hierarchical Integrity Policies. 8th National Computer Security Conference. Gorine, Andrei; Krivolapov, Alexander (May 2008). "Kernel Mode
Delegated administration (496 words) [view diff] case mismatch in snippet view article find links to article
WindowsSecurity.Com Ferraiolo, D.F. & Kuhn, D.R. (October 1992). "Role-Based Access Control" (PDF). 15th National Computer Security Conference: 554–563.
Addison Fischer (1,312 words) [view diff] case mismatch in snippet view article find links to article
""Electronic Document Authorization," Proceedings of the 13th National Computer Security Conference" (PDF). fwsudia.com. Archived from the original (PDF) on 11 July
Random password generator (2,482 words) [view diff] case mismatch in snippet view article find links to article
Generators" (PDF). Proceedings of the 17th {NIST}-{NCSC} National Computer Security Conference. NIST: 184–197. Retrieved 2014-12-17. "Rate my random password
OpenVMS (9,014 words) [view diff] case mismatch in snippet view article find links to article
(June 1989). "The "Father Christmas" Worm" (PDF). 12th National Computer Security Conference Proceedings. Retrieved November 23, 2015. Kevin Rich (November
Attack tree (1,350 words) [view diff] case mismatch in snippet view article find links to article
2023-09-05 "A System Security Engineering Process, 14th National Computer Security Conference, Washington DC" (PDF). Retrieved 2023-03-18. Amoroso, Edward
Virgil D. Gligor (2,307 words) [view diff] case mismatch in snippet view article find links to article
Penetration Analysis Method and Tool, Proc. of 15th National Computer security Conference, Baltimore, MD, pp. 165-183 (October 1992)" (PDF). {{cite journal}}: