Skip to main content
Search results
https://apps.dtic.mil/docs/citations/ADA430991
Using software components to develop mission-critical systems poses a number...is how the consumers of software components-that is, the developers of ...
https://apps.dtic.mil/docs/citations/ADA449067
Malicious code detection is a crucial component of any defense mechanism. In...unique viewpoint on malicious code detection. We regard malicious code ...
https://apps.dtic.mil/docs/citations/ADA448490
...systems and applications against malicious software attacks increases the security...authenticity of output. We present components to integrate a ...
https://static.e-publishing.af.mil/production/1/saf_cn/publication/afman17-1301/afman17-1301.pdf
........................... 20 4.4. Malicious Logic Protection. .................information systems from other DoD components. (T-0). 2.3.2.4. Review ...
https://apps.dtic.mil/docs/citations/AD1033052
...to develop components for automated system to analyze malicious software malware...Title: Improvement of Binary Analysis Components in Automated ...
https://niccs.cisa.gov/education-training/catalog/mandiant-inc/malicious-documents-analysis
...used to perform malware analysis on malicious documents using a pract...Malicious Documents Analysis Online, Instructor-Led Course Description ...
https://apps.dtic.mil/sti/citations/tr/ADA449067
Malicious code detection is a crucial component of any defense mechanism. In...unique viewpoint on malicious code detection. We regard malicious code ...
https://apps.dtic.mil/sti/citations/tr/ADA430991
Using software components to develop mission-critical systems poses a number...is how the consumers of software components-that is, the developers of ...
https://clintonwhitehouse2.archives.gov/WH/EOP/OSTP/html/cyber2.html
...direct, independent failure of key components that in themselves represent major...reaction, in which a subsystem or component failure induces other ...
https://apps.dtic.mil/sti/citations/tr/ADA582439
...means to identify the threats of malicious applications is necessary. This paper...Android malware through application component analysis. The ...
https://www.cisa.gov/resources-tools/programs/bomb-making-materials-awareness-program-bmap
...focuses on restricting access by malicious actors to explosive precursor chemicals...powders, target materials, associated components, and delivery ...
https://apps.dtic.mil/sti/citations/tr/ADP010674
COTS components are very attractive because they can substantially reduce development...time-bomb and hopefully of all types of malicious actions- is ...
https://static.e-publishing.af.mil/production/1/af_a2_6/publication/afi17-203/afi17-203.pdf
...administrator). If the IS is compromised with malicious code that provides remote interactive...resources. If the IS is compromised with malicious ...
https://apps.dtic.mil/sti/citations/tr/ADA448490
...systems and applications against malicious software attacks increases the security...authenticity of output. We present components to integrate a ...
https://www.nrc.gov/reading-rm/doc-collections/gen-comm/info-notices/1996/in96071.html
Indications of Tampering, Vandalism, or Malicious...Indications of Tampering, Vandalism, or Malicious Mischief UNITED STATES NUCLEAR ...
https://apps.dtic.mil/sti/citations/tr/ADA583973
Acquisition SCADA attack by detecting malicious software andor trojan hardware. A...malfunctioning or malicious software, firmware, etc., and 2 ...
https://www.dhs.gov/archive/publication/dhs-actions-cybersecurity
Department of Homeland Security and its components, namely its Cybersecurity and Infrastructure...nation and sectors, investigating malicious cyber ...
https://apps.dtic.mil/docs/citations/ADA453987
...difficult to protect organizations from malicious insiders. The typical methods of...employees with increased risk of becoming malicious insiders. The ...
https://apps.dtic.mil/sti/tr/pdf/ADA449067.pdf
Malicious code detection is a crucial component of any defense mechanism. In...unique viewpoint on malicious code detection. We regard malicious code ...
https://www.dhs.gov/archive/news/2023/03/02/statement-secretary-mayorkas-president-bidens-national-cybersecurity-strategy
Department of Homeland Security and its components play a leading role in strengthening...across the nation and investigating malicious cyber ...