Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search

Showing results 91 - 100 of 1242661 documents for prestamos inmediatos sin aval en el df Visitar el sitio WWWLOAN24HXYZ prestamo de nomina bancomer sin buro prestamos personales por auto credito hipotecario santander estado de cuenta credito personal con garantia hipotecaria mexico prestamos personales sin comprobar ingresos en monterrey estado de cuenta del credito fonacot prestamos de efectivo en tampico prestamos con garantia en torreon prestamos de nomina coppel creditos personales sin aval y sin nomina prestamos en zaragoza milanuncios prestamos caja libertad san luis potosi creditos personales sin checar buro de credito
Relevance
Date
  1. TDSC-0026-0204-1 1..12

    https://www.nist.gov/system/files/documents/itl/antd/Monitoring-the-Macroscopic-Effect-of-DDoS-Flooding-Attacks.pdf
    Monitoring the Macroscopic Effect of DDoS Flooding Attacks Jian Yuan and Kevin Mills, Senior Member, IEEE Abstract—Creating defenses against flooding-based, distributed denial-of-service (DDoS) attacks requires real-time monitoring of network-wide traffic to obtain timely and significant information. Unfortunately, continuously monitoring network-wide traffic for suspicious activities presents difficult challenges because attacks may arise anywhere at any time and because attackers constantly modify attack dynamics to evade detection. In this paper, we propose a method for early attack detection. Using only a few observation points, our proposed method can monitor the macroscopic effect of DDoS flooding attacks. We show that such macroscopic-level monitoring might be used to capture shifts in spatial-temporal traffic patterns caus...
  2. https://csrc.nist.gov/csrc/media/events/non-invasive-attack-testing-workshop/documents/04_hayashi.pdf

    https://csrc.nist.gov/CSRC/media/Events/Non-Invasive-Attack-Testing-Workshop/documents/04_Hayashi.pdf
    Non-invasive Trigger-free Fault Injection Method Based on Intentional Electromagnetic Interference Yu-ichi Hayashi, Naofumi Homma, Takeshi Sugawara, Takaaki Mizuki, Takafumi Aoki, and Hideaki Sone Tohoku University, Aramaki Aza Aoba 6-6-5, Sendai 980-8579, Japan Abstract—This paper presents a new type of fault injec- tion method based on intentional electromagnetic interference (IEMI), which causes information leakage from cryptographic devices without disrupting their operations or damaging their physical structures. The basic principle is to transmit a sinusoidal EM wave via a power/communication cable or an antenna. The IEMI-based fault injection method is performed at a distance from the target module through many filtering components, such as a voltage regulator, without leaving any hard evidence of the attack. It can also be appl...
  3. Code of Ethical Conduct

    https://www.nist.gov/system/files/documents/2017/01/31/code_of_ethical_conduct_for_link_in_elearning_module.pdf
    Rev. 8/30/2017 Code of Ethical Conduct Members of the Board of Examiners (members) for the Malcolm Baldrige National Quality Award pledge to uphold their professional principles in the fulfillment of their responsibilities as defined in the administration of Public Law 100-107, the Malcolm Baldrige National Quality Improvement Act of 1987. The Board of Examiners Code of Ethical Conduct establishes accountability for these principles. Four principles are the foundation of the Code of Ethical Conduct. These principles are intended to protect the interests of all key stakeholders, including applicants, examiners, judges, and the program, creating a safe and empowering environment for all to engage, share, learn, and improve. Known violations should be reported as soon as practical to the BPEP Director, who will not release the so...
  4. ISPAB Meeting Agenda for September 14-15, 2006 (Final)

    https://csrc.nist.gov/CSRC/media//Projects/ISPAB/documents/agenda/2006_agenda-ispab-september-meeting.pdf
    INFORMATION SECURITY AND PRIVACY ADVISORY BOARD _____________________________ Established by the Computer Security Act of 1987 [Amended by the Federal Information Security Management Act of 2002] MEETING AGENDA September 14 – 15, 2006 George Washington University Cafritz Conference Center 800 21st Street, NW, Room 101 Washington, D.C. *Please note: Speakers/times are subject to change without notice. Thursday, September 14, 2006 8:30 a.m. – 9:00 a.m. Welcome and Remarks Dan Chenok, SRA International, Inc., Vice President Board Chairman 9:00 a.m. – 10:00 a.m. NIST Computer Security Division Update Curt Barker, Division Chief, NIST Computer Security Division 10:00 a.m. – 10:15 a.m. B-R-E-A-K 10:15 a.m....
  5. Aggregate LTE: Characterizing User Equipment Emissions Phase 1 Test and Metrology Plan: Laboratory measurements

    https://www.nist.gov/system/files/documents/2017/09/13/public_brief_13sept2017_v6.pdf
    Dr. Sheryl Genco Acting NASCTN Program Manager Aggregate LTE: Characterizing User Equipment Emissions Welcome 13 September 2017 National Advanced Spectrum and Communications Test Network (NASCTN) • Established by NIST, NTIA, and DoD in 2015 • Mission: provide robust test processes and validated measurement data necessary to ▫ Develop, evaluate, and deploy spectrum sharing technologies ▫ Inform spectrum policy and regulations What is NASCTN? 2 ▫Test plan development ▫Stakeholder outreach ▫ Identify and facilitate access to appropriate test facilities ▫Test execution ▫Deliver detailed methods and results Transparency, validity, and reproducibility ▫Protect controlled information NASCTN Core Functions 3 Complete (see https://www.nist.gov/ctl/nasctn/projects for more info) • Waveform Measurement...
  6. https://www.nccoe.nist.gov/sites/default/files/library/project-descriptions/hosp-pms-project-description-final.pdf

    https://www.nccoe.nist.gov/sites/default/files/library/project-descriptions/hosp-pms-project-description-final.pdf
    SECURING PROPERTY MANAGEMENT SYSTEMS Cybersecurity for the Hospitality Sector William Newhouse National Cybersecurity Center of Excellence National Institute of Standards and Technology Michael Ekstrom Jeff Finke Sarah Weeks The MITRE Corporation September 13, 2017 hospitality-nccoe@nist.gov This revision incorporates comments from the public. P R O JEC T D ESC R IP TIO N Project Description: Securing Property Management Systems 1 The National Cybersecurity Center of Excellence (NCCoE), a part of the National Institute of Standards and Technology (NIST), is a collaborative hub where industry organizations, government agencies, and academic institutions work together to address businesses’ most pressing cybersecurity challenges. Through this collaboration, the NCCoE deve...
  7. toc-final-doc.PDF

    https://csrc.nist.gov/CSRC/media/Publications/conference-paper/2000/10/19/proceedings-of-the-23rd-nissc-2000/documents/toc.pdf
    23rd National Information Systems Security Conference Conference Committee ..........................................................................................................................i Table of Contents..................................................................................................................................ii Refereed Papers Next Generation Intrusion Detection: Autonomous Reinforcement ...........................File Size: 90 K Learning of Network Attacks James Cannady, Georgia Institute of Technology Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection ..........File Size: 113 K Susan M. Bridges & Rayford B. Vaughn, Mississippi State University Slides: File Size: 2 M (may take a while to open)................Zipped file 558 K Multiple Self-Organizing Maps for Intrusion De...
  8. Draft NIST SP 800-177 Revision 1, Trustworthy Email

    https://csrc.nist.gov/CSRC/media/Publications/sp/800-177/rev-1/draft/documents/sp800-177r1-draft.pdf
    DRAFT NIST Special Publication 800-177 1 Revision 1 2 Trustworthy Email 3 4 5 Ramaswamy Chandramouli 6 Simson Garfinkel 7 Stephen Nightingale 8 Scott Rose 9 10 11 12 13 14 15 16 17 18 C O M P U T E R S E C U R I T Y 19 20 21 DRAFT NIST Special Publication 800-177 22 Revision 1 23 Trustworthy Email 24 25 Scott Rose 26 Stephen Nightingale 27 Information Technology Laboratory 28 Advanced Network Technology Division 29 30 Simson L. Garfinkel 31 US Census Bureau 32 33 Ramaswamy Chandramouli 34 Information Technology Laboratory 35 Computer Security Division 36 37 38 39 40 41 42 43 September 2017 44 45 46 47 48 U.S. Department of Commerce 49 Wilbur L. Ross, Jr., Secretary 50 51 National Institute of Standards an...
  9. https://www.nist.gov/system/files/documents/2018/09/12/solicitation_1333nd18qnb640605_power_amplifiers.pdf

    https://www.nist.gov/system/files/documents/2018/09/12/solicitation_1333nd18qnb640605_power_amplifiers.pdf
    RFQ IFB RFP WOMEN-OWNED SMALL BUSINESS (WOSB) ELIGIBLE UNDER THE WOMEN-OWNED SOLICITATION/CONTRACT/ORDER FOR COMMERCIAL ITEMS OFFEROR TO COMPLETE BLOCKS 12, 17, 23, 24, & 30 1. REQUISITION NUMBER PAGE OF 2. CONTRACT NO. 3. AWARD/EFFECTIVE DATE 4. ORDER NUMBER 5. SOLICITATION NUMBER 6. SOLICITATION ISSUE DATE 7. FOR SOLICITATION INFORMATION CALL: a. NAME b. TELEPHONE NUMBER (No collect calls) 8. OFFER DUE DATE/ LOCAL TIME 9. ISSUED BY 13b. RATING 14. METHOD OF SOLICITATION CODE 15. DELIVER TO 16. ADMINISTERED BY CODE 18a. PAYMENT WILL BE MADE BY CODEFACILITYCODE CODE TELEPHONE NO. 17b. CHECK IF REMITTANCE IS DIFFERENT AND PUT SUCH ADDRESS IN OFFER 18b. SUBMIT INVOICES TO ADDRESS SHOWN IN BLOCK 18a UNLESS BLOCK BELOW IS CHECKED SEE ADDENDUM 19. ITEM NO. ...
  10. WMConnection-Vol4-Issue4--Sept-11-2013(4)_WMConnections

    https://www.nist.gov/system/files/documents/2017/05/09/WMConnection-Vol4-Issue5-Sept-11-2013.pdf
    Inside this Issue Package Testing Based on the Largest of the Declared Quantities 1 Calendar 2 This Month in History September 2, 1789 - The U.S. Treasury was established by Congress as the third Presi- dential cabinet. September 3, 1783 - John Adams, Ben Franklin, and John Jay, signed the Tready of Paris and offically ending the American Rev- oluntary War. September 8, 1883 - This day marks the com- pletion of the Northern Pacific Railroad across the United States. September 9, 1776 - The Continential Con- gress changed the name of the country from the United Colonies to the United States. September 13, 1788 - New York was selected by Congress as the capital for the New Amer- ican government. September 18, 1947 - the U.S. Air Force was established as a separate military service. September 23 - Autumn officially begins in th...
Showing results 91 - 100 of 1242661 documents for prestamos inmediatos sin aval en el df Visitar el sitio WWWLOAN24HXYZ prestamo de nomina bancomer sin buro prestamos personales por auto credito hipotecario santander estado de cuenta credito personal con garantia hipotecaria mexico prestamos personales sin comprobar ingresos en monterrey estado de cuenta del credito fonacot prestamos de efectivo en tampico prestamos con garantia en torreon prestamos de nomina coppel creditos personales sin aval y sin nomina prestamos en zaragoza milanuncios prestamos caja libertad san luis potosi creditos personales sin checar buro de credito