ICS Village - CRASHOVERRIDE: Re- Assessing 2016 Ukraine as a Protection Attack
Formal Metadata
Title |
| |
Alternative Title |
| |
Title of Series | ||
Number of Parts | 335 | |
Author | ||
License | CC Attribution 3.0 Unported: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/48895 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
|
00:00
Intrusion detection systemBitFunction (mathematics)Crash (computing)Electric power transmissionEvent horizonPerspective (visual)Term (mathematics)Integrated development environmentComputer animation
00:28
Data integrityProcess (computing)Crash (computing)Function (mathematics)Computer scienceInformation securityEvent horizonWeb pageBitOperator (mathematics)INTEGRALOffice suitePoint (geometry)Integrated development environmentProduct (business)Process (computing)Electric power transmissionFörderverein International Co-Operative StudiesComputer animationLecture/Conference
01:40
Power (physics)Crash (computing)Operations researchMalwareData integrityControl flowSystem programmingMathematical analysisFunction (mathematics)String (computer science)Order (biology)MalwareMechanism designCrash (computing)Operator (mathematics)AutomationComputer animation
02:15
Data integrityEvent horizonDenial-of-service attackControl systemIntegrated development environmentEnterprise architectureMultiplication signChainMalwareOperator (mathematics)Entire functionFunction (mathematics)Crash (computing)UsabilityData recoveryData transmissionProjective planePhysical systemInheritance (object-oriented programming)Computer filePoint (geometry)Computer animationLecture/Conference
03:21
Data integrityComputer virusTerm (mathematics)Crash (computing)Presentation of a groupUtility softwareCybersexEvent horizonFunction (mathematics)Operator (mathematics)Bulletin board systemQuicksortComputer animation
04:03
Data integrityTelecommunicationCommunications protocolCASE <Informatik>State of matterEvent horizonSampling (statistics)Software testingMalwareImplementationMathematical analysisTelecommunicationQuicksortTraffic reportingLatent heatComputer animation
04:53
System programmingSingle-precision floating-point formatDistribution (mathematics)MalwareData integrityOperations researchWebsiteWorkstation <Musikinstrument>Integrated development environmentOperator (mathematics)Interactive televisionQuicksortWebsiteControl systemSoftwareFrequencyDifferent (Kate Ryan album)MultilaterationVideoconferencingLinear regressionYouTubeData recoveryPhysical systemMultiplication signElectric power transmissionPoint (geometry)10 (number)Computer animationLecture/Conference
06:34
Data integrityMalwareCrash (computing)MalwareTerm (mathematics)Förderverein International Co-Operative StudiesReverse engineeringFunction (mathematics)Lecture/Conference
07:04
MiniDiscDensity of statesWorkstation <Musikinstrument>Hospital information systemData integrityPairwise comparisonCASE <Informatik>TelecommunicationDistribution (mathematics)Workstation <Musikinstrument>Hospital information systemIntegrated development environmentData recoveryContext awarenessCondition numberWeightFörderverein International Co-Operative StudiesSerial portGame controllerDenial-of-service attackFirmwareComputer fileInsertion lossConnected spaceEvent horizonPairwise comparisonBitGroup actionIntelligent NetworkOperator (mathematics)Order (biology)View (database)Service (economics)Multiplication signScaling (geometry)MiniDiscNumberSoftware frameworkComputer animationLecture/Conference
08:10
Process (computing)Product (business)Software maintenanceOperations researchFunction (mathematics)Data integrityConsistencyTerm (mathematics)Control flowDrag (physics)Process (computing)NumberTriangleINTEGRALPressureDistribution (mathematics)MereologyWindowResultantIntegrated development environmentStability theoryFundamental theorem of algebraGUI widgetOperator (mathematics)Software maintenanceUtility softwareMultiplication signData transmissionLine (geometry)ArmExpected valueLecture/Conference
09:22
Data integrityFörderverein International Co-Operative StudiesPower (physics)Bit rateOperator (mathematics)Integrated development environmentControl systemEvent horizonGUI widgetProcess (computing)Sound effectINTEGRALCondition numberElectric power transmissionCybersexComputer animation
10:22
Graphic designData integritySurface of revolutionQuicksortElectric power transmissionPhase transitionOcean currentIntegrated development environmentOperator (mathematics)ResultantVirtual machineDigitizingLine (geometry)Power (physics)ImplementationComputer animationLecture/Conference
11:02
Data integrityTrigonometryCondition numberExtreme programmingFrequencyLine (geometry)Integrated development environmentTransformation (genetics)Hazard (2005 film)Crash (computing)Asynchronous Transfer ModeElectric generatorOperator (mathematics)Function (mathematics)Level (video gaming)Data transmissionWorkstation <Musikinstrument>ImplementationBitMereologyNetwork topologyPoint (geometry)Sound effectPower (physics)Stress (mechanics)Structural loadCausalityMultilaterationComputer animationLecture/Conference
12:30
Data integrityScale (map)Sound effectFunctional (mathematics)Event horizonLogicLine (geometry)Condition numberState observerIntegrated development environmentData transmissionResultantTransformation (genetics)Workstation <Musikinstrument>Right angleFunction (mathematics)Operator (mathematics)Field (computer science)Power (physics)State of matterPhysical systemMultiplication signMultiplicationWebsiteMassMalwareMathematical analysisDenial-of-service attackData recoveryView (database)Insertion lossCrash (computing)Term (mathematics)Similarity (geometry)CASE <Informatik>Asynchronous Transfer ModeInheritance (object-oriented programming)
15:14
TelecommunicationNetwork socketLimit of a functionCommunications protocolImplementationMalwareData integrityAddress spaceCase moddingDenial-of-service attackProper mapMalwareCommunications protocolSoftware testingTelecommunicationIntegrated development environmentLimit of a functionIP addressImplementationOperator (mathematics)Inheritance (object-oriented programming)Process (computing)Latent heatCASE <Informatik>ResultantPhysical systemState of matterEvent horizonMultiplication signNetwork socketDensity of statesComputer animation
16:46
Data integrityDensity of statesAsynchronous Transfer ModeInheritance (object-oriented programming)Pythagorean theoremSheaf (mathematics)Data transmissionIntegrated development environmentLine (geometry)Arc (geometry)Natural numberComputer animationLecture/Conference
18:00
Sound effectSystem programmingData integritySampling (statistics)VacuumEvent horizonIntegrated development environmentNetwork topologyInstance (computer science)SequenceDatabase normalizationBackupPower (physics)Sound effectOperator (mathematics)Process (computing)Function (mathematics)Data transmissionMultiplication sign1 (number)Crash (computing)Physical systemMalwareDataflowPhysicalismLecture/Conference
19:57
Data integrityEvent horizonStatistical dispersionFrequencyProcess (computing)INTEGRALMultiplication signFunction (mathematics)Distribution (mathematics)Electric generatorProduct (business)Proper mapUtility softwareLecture/ConferenceComputer animation
20:28
Data integrityData recoveryMathematical analysisProcess (computing)Information securityOracleState of matterOperator (mathematics)Multiplication signCrash (computing)Process (computing)Workstation <Musikinstrument>Event horizonTelecommunicationInformation securityInsertion lossPoint (geometry)Integrated development environmentQuicksortMechanism designFundamental theorem of algebraOrder (biology)Position operatorData transmissionFlagBitINTEGRALDecision theoryWebsiteCuboidControl systemPerspective (visual)Function (mathematics)Computer animationLecture/Conference
22:40
Data integrityMathematical analysisCross-correlationPiMassData transmissionRootDecision theoryQuicksortCausalityMultiplicationMechanism designType theoryMathematical analysisEvent horizonTelecommunicationCrash (computing)Level (video gaming)Fundamental theorem of algebraCombinational logicPhysical systemIntegrated development environmentVector potentialOperator (mathematics)Point (geometry)Function (mathematics)CybersexBus (computing)Flow separationCASE <Informatik>Cross-correlationComputer forensicsComputer animation
24:13
Event horizonCNNConvex hullRankingCybersexPower (physics)Vulnerability (computing)Link (knot theory)WebsiteSlide ruleOperator (mathematics)
24:49
MaizeData integritySlide ruleMultiplication signMusical ensembleComputer animationLecture/Conference
25:14
Data integrityProcess (computing)Control flowSoftware maintenanceOperations researchTerm (mathematics)Product (business)Function (mathematics)ConsistencyDrag (physics)System programmingDistribution (mathematics)Single-precision floating-point formatMalwareFunction (mathematics)Field (computer science)Functional (mathematics)Crash (computing)Operator (mathematics)Fundamental theorem of algebraCybersexPresentation of a groupMultiplication signProcedural programmingLevel (video gaming)Integrated development environmentState of matterEmulatorMathematical analysisSound effectINTEGRALEvent horizonInsertion lossRight angleView (database)Software suitePoint (geometry)Utility softwareSoftwareFörderverein International Co-Operative StudiesSoftware testingTelecommunicationTerm (mathematics)Physical systemProcess (computing)ResultantMalwareGame controllerWordQuicksortModal logicDifferential (mechanical device)Sinc functionLimit (category theory)Interactive televisionMusical ensemblePerspective (visual)PhysicalismMass1 (number)Speech synthesisGoodness of fitMereologyVulnerability (computing)Euler anglesExistenceChainLecture/ConferenceComputer animation
Transcript: English(auto-generated)