Data Integrity Based Attacks in Investigative Domains - USENIX Enigma Conference - 2016

Data Integrity Based Attacks in Investigative Domains - USENIX Enigma Conference - 2016

USENIX Enigma Conference via YouTube Direct link

Data Integrity Based Attacks in Investigative Domains

2 of 18

2 of 18

Data Integrity Based Attacks in Investigative Domains

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Data Integrity Based Attacks in Investigative Domains - USENIX Enigma Conference - 2016

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Data Integrity Based Attacks in Investigative Domains
  3. 3 Automated Reasoning and Machine Intelligence
  4. 4 International Procurement
  5. 5 National Entity buys goods and services
  6. 6 Anatomy of an Attack on Data Integrity
  7. 7 Ability Misrepresentation
  8. 8 Environment Misrepresentation
  9. 9 Strategy of Data Integrity Attacks
  10. 10 Identity Obfuscation
  11. 11 PricewaterhouseCoopers
  12. 12 Strategy of Data Integrity Defense
  13. 13 Mining Expert Data Systems
  14. 14 Learning from the Experts
  15. 15 Leveraging Data Superiority
  16. 16 Not Just a Problem for International Finance and Development
  17. 17 Data Integrity by Design
  18. 18 Call to Action!

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.