×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [target victim]
Technology
Post Metasploitation
4.383 views
Technology
Ira Wilsker's January 2014 Identity Theft Presentation
870 views
Business
The Experiences of a Cyber Attack Victim
118 views
Documents
Anonymity for Continuous Data Publishing Benjamin C. M. Fung Concordia University Montreal, QC, Canada fung Ke Wang Simon
217 views
Documents
Terrorist Targeting, Information, and Coalition Behavior Maurice Koster Ines Lindner Gordon McCormick Guillermo Owen
218 views
Documents
Hey You, Get Off My Cloud: Exploring information Leakage in third party compute clouds T.Ristenpart, Eran Tromer, Hovav Shacham and Steven Savage ACM CCS
221 views
Documents
Anonymizing Location-based data Jarmanjit Singh Jar_sing(at)encs.concordia.ca Harpreet Sandhu h_san(at)encs.concordia.ca Qing Shi q_shi(at)encs.concordia.ca
215 views
Documents
Hey You, Get Off My Cloud: Exploring information Leakage in third party compute clouds
45 views
Documents
Anonymity for Continuous Data Publishing
42 views