Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Computer security conference 21 found (42 total)

alternate case: computer security conference

David Elliott Bell (713 words) [view diff] case mismatch in snippet view article find links to article

"Trusted Xenix Interpretation: Phase 1". At the 13th National Computer Security Conference. The two papers Bell published in 1991 and 1992, "Lattices, Policies
Defcon Robot Contest (517 words) [view diff] exact match in snippet view article find links to article
a robotics competition which was held at the annual DEF CON computer security conference in Las Vegas. The first competition was held at Defcon 11 in
Intrusion detection system (5,525 words) [view diff] case mismatch in snippet view article find links to article
Systems in Intrusion Detection: A Case Study," The 11th National Computer Security Conference, October, 1988 Smaha, Stephen E., "Haystack: An Intrusion Detection
Role-based access control (2,300 words) [view diff] case mismatch in snippet view article find links to article
(October 1992). "Role-Based Access Control" (PDF). 15th National Computer Security Conference: 554–563. Sandhu, R., Coyne, E.J., Feinstein, H.L. and Youman
Father Christmas (computer worm) (408 words) [view diff] case mismatch in snippet view article
(June 1989). "The "Father Christmas" Worm" (PDF). 12th National Computer Security Conference Proceedings. Retrieved November 23, 2015. Nazario, Joe (2004)
Information wants to be free (1,256 words) [view diff] case mismatch in snippet view article find links to article
Break into Computer Systems", Proceedings of the 13th National Computer Security Conference, Washington, DC: Georgetown, pp. 653–64, archived from the original
Sir Dystic (595 words) [view diff] no match in snippet view article find links to article
Retrieved 18 May 2006. Pennington, Sylvia. "Hackers hold key to computer security, conference told Archived 2007-03-12 at the Wayback Machine." vnunet.com
Phrack (1,494 words) [view diff] case mismatch in snippet view article find links to article
and gossip among the hacker community. In the 1990 National Computer Security Conference, Sheldon Zenner and Dorothy Denning suggested that Phrack articles
Type enforcement (610 words) [view diff] case mismatch in snippet view article find links to article
to Hierarchical Integrity Policies, In Proceedings of the 8th National Computer Security Conference, page 18, 1985. LOCK - A trusted computing system
Biswanath Mukherjee (1,295 words) [view diff] case mismatch in snippet view article find links to article
[citation needed] 1994: Co-winner, Paper Award, 17th National Computer Security Conference, for the paper "Testing Intrusion Detection Systems: Design Methodologies
AGDLP (947 words) [view diff] case mismatch in snippet view article find links to article
(October 1992). "Role Based Access Control" (PDF). 15th National Computer Security Conference. pp. 554–563. Sandhu, R.; Coyne, E.J.; Feinstein, H.L.; Youman
Trusted Computer System Evaluation Criteria (2,101 words) [view diff] case mismatch in snippet view article find links to article
Dan Edwards, Roger Schell, and Marvin Schaeffer of National Computer Security Conference; and Ted Lee of Univac. A number of people from government, government
Protection ring (3,719 words) [view diff] case mismatch in snippet view article find links to article
Alternative to Hierarchical Integrity Policies. 8th National Computer Security Conference. Gorine, Andrei; Krivolapov, Alexander (May 2008). "Kernel Mode
Random password generator (1,260 words) [view diff] case mismatch in snippet view article find links to article
Generators" (PDF). Proceedings of the 17th {NIST}-{NCSC} National Computer Security Conference. NIST: 184–197. Retrieved 2014-12-17. Levine, John R., Ed.: Internet
DNA Lounge (3,704 words) [view diff] exact match in snippet view article find links to article
hacker con), Ignite (a technology conference), and BSidesSF (a computer security conference). The release of Mozilla 1.0 was celebrated there in 2002, and
Medtronic (4,721 words) [view diff] case mismatch in snippet view article find links to article
a security vulnerability in a Medtronic insulin pump at the Computer Security conference Black Hat Briefings, allowing an attacker to take control of
Delegated administration (496 words) [view diff] case mismatch in snippet view article find links to article
WindowsSecurity.Com Ferraiolo, D.F. & Kuhn, D.R. (October 1992). "Role-Based Access Control" (PDF). 15th National Computer Security Conference: 554–563.
Addison Fischer (1,354 words) [view diff] case mismatch in snippet view article find links to article
""Electronic Document Authorization," Proceedings of the 13th National Computer Security Conference" (PDF). fwsudia.com. Archived from the original (PDF) on 11 July
OpenVMS (9,045 words) [view diff] case mismatch in snippet view article find links to article
(June 1989). "The "Father Christmas" Worm" (PDF). 12th National Computer Security Conference Proceedings. Retrieved November 23, 2015. Kevin Rich (November
Attack tree (1,353 words) [view diff] case mismatch in snippet view article find links to article
2023-09-05 "A System Security Engineering Process, 14th National Computer Security Conference, Washington DC" (PDF). Retrieved 2023-03-18. Amoroso, Edward
Virgil D. Gligor (2,307 words) [view diff] case mismatch in snippet view article find links to article
Penetration Analysis Method and Tool, Proc. of 15th National Computer security Conference, Baltimore, MD, pp. 165-183 (October 1992)" (PDF). {{cite journal}}: