language:
Find link is a tool written by Edward Betts.searching for Computer security conference 21 found (42 total)
alternate case: computer security conference
David Elliott Bell
(713 words)
[view diff]
case mismatch in snippet
view article
find links to article
"Trusted Xenix Interpretation: Phase 1". At the 13th National Computer Security Conference. The two papers Bell published in 1991 and 1992, "Lattices, PoliciesDefcon Robot Contest (517 words) [view diff] exact match in snippet view article find links to article
a robotics competition which was held at the annual DEF CON computer security conference in Las Vegas. The first competition was held at Defcon 11 inIntrusion detection system (5,525 words) [view diff] case mismatch in snippet view article find links to article
Systems in Intrusion Detection: A Case Study," The 11th National Computer Security Conference, October, 1988 Smaha, Stephen E., "Haystack: An Intrusion DetectionRole-based access control (2,300 words) [view diff] case mismatch in snippet view article find links to article
(October 1992). "Role-Based Access Control" (PDF). 15th National Computer Security Conference: 554–563. Sandhu, R., Coyne, E.J., Feinstein, H.L. and YoumanFather Christmas (computer worm) (408 words) [view diff] case mismatch in snippet view article
(June 1989). "The "Father Christmas" Worm" (PDF). 12th National Computer Security Conference Proceedings. Retrieved November 23, 2015. Nazario, Joe (2004)Information wants to be free (1,256 words) [view diff] case mismatch in snippet view article find links to article
Break into Computer Systems", Proceedings of the 13th National Computer Security Conference, Washington, DC: Georgetown, pp. 653–64, archived from the originalSir Dystic (595 words) [view diff] no match in snippet view article find links to article
Retrieved 18 May 2006. Pennington, Sylvia. "Hackers hold key to computer security, conference told Archived 2007-03-12 at the Wayback Machine." vnunet.comPhrack (1,494 words) [view diff] case mismatch in snippet view article find links to article
and gossip among the hacker community. In the 1990 National Computer Security Conference, Sheldon Zenner and Dorothy Denning suggested that Phrack articlesType enforcement (610 words) [view diff] case mismatch in snippet view article find links to article
to Hierarchical Integrity Policies, In Proceedings of the 8th National Computer Security Conference, page 18, 1985. LOCK - A trusted computing systemBiswanath Mukherjee (1,295 words) [view diff] case mismatch in snippet view article find links to article
[citation needed] 1994: Co-winner, Paper Award, 17th National Computer Security Conference, for the paper "Testing Intrusion Detection Systems: Design MethodologiesAGDLP (947 words) [view diff] case mismatch in snippet view article find links to article
(October 1992). "Role Based Access Control" (PDF). 15th National Computer Security Conference. pp. 554–563. Sandhu, R.; Coyne, E.J.; Feinstein, H.L.; YoumanTrusted Computer System Evaluation Criteria (2,101 words) [view diff] case mismatch in snippet view article find links to article
Dan Edwards, Roger Schell, and Marvin Schaeffer of National Computer Security Conference; and Ted Lee of Univac. A number of people from government, governmentProtection ring (3,719 words) [view diff] case mismatch in snippet view article find links to article
Alternative to Hierarchical Integrity Policies. 8th National Computer Security Conference. Gorine, Andrei; Krivolapov, Alexander (May 2008). "Kernel ModeRandom password generator (1,260 words) [view diff] case mismatch in snippet view article find links to article
Generators" (PDF). Proceedings of the 17th {NIST}-{NCSC} National Computer Security Conference. NIST: 184–197. Retrieved 2014-12-17. Levine, John R., Ed.: InternetDNA Lounge (3,704 words) [view diff] exact match in snippet view article find links to article
hacker con), Ignite (a technology conference), and BSidesSF (a computer security conference). The release of Mozilla 1.0 was celebrated there in 2002, andMedtronic (4,721 words) [view diff] case mismatch in snippet view article find links to article
a security vulnerability in a Medtronic insulin pump at the Computer Security conference Black Hat Briefings, allowing an attacker to take control ofDelegated administration (496 words) [view diff] case mismatch in snippet view article find links to article
WindowsSecurity.Com Ferraiolo, D.F. & Kuhn, D.R. (October 1992). "Role-Based Access Control" (PDF). 15th National Computer Security Conference: 554–563.Addison Fischer (1,354 words) [view diff] case mismatch in snippet view article find links to article
""Electronic Document Authorization," Proceedings of the 13th National Computer Security Conference" (PDF). fwsudia.com. Archived from the original (PDF) on 11 JulyOpenVMS (9,045 words) [view diff] case mismatch in snippet view article find links to article
(June 1989). "The "Father Christmas" Worm" (PDF). 12th National Computer Security Conference Proceedings. Retrieved November 23, 2015. Kevin Rich (NovemberAttack tree (1,353 words) [view diff] case mismatch in snippet view article find links to article
2023-09-05 "A System Security Engineering Process, 14th National Computer Security Conference, Washington DC" (PDF). Retrieved 2023-03-18. Amoroso, EdwardVirgil D. Gligor (2,307 words) [view diff] case mismatch in snippet view article find links to article
Penetration Analysis Method and Tool, Proc. of 15th National Computer security Conference, Baltimore, MD, pp. 165-183 (October 1992)" (PDF). {{cite journal}}: