Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Vulnerabilities-Security'
Vulnerabilities-Security published presentations and documents on DocSlides.
Restoration Under a Future Climate
by karlyn-bohler
Restoration Under a Future Climate Understanding ...
CVE Team Becoming a CNA Overview
by min-jolicoeur
Defining CNAs. How to organize your CNA(s). Defin...
A Kernel Vulnerability
by alexa-scheidler
Detection . Framework based on Hardware. Guanglu....
Towards Automatic S ignature Generation
by kittie-lecroy
. of . Vulnerability-based . Signature. By David...
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic
by tatyana-admore
Software Vulnerability Detection. . Tielei . Wan...
Integration of gender, age, disability, and cultural perspectives in the post-2015 framework for DR
by aaron
Emma Lovell, Research Officer. e.lovell@odi.org.u...
Shifting Focus from U.S
by tatiana-dople
. Technological Dominance . to U.S. . Allied Domi...
CVE Team Becoming a CNA Overview
by lindy-dunigan
Defining CNAs. How to organize your CNA(s). Defin...
Industrial Control System Cybersecurity
by tawny-fly
SCADA Security Laboratory. Cyber Kill Chain. Prep...
Secure Programming 6. Buffer Overflow (Strings and Integers) Part 1
by celsa-spraggs
Chih. Hung Wang. Reference:. 1. B. Chess and J. ...
Detecting Vulnerabilities in Web Code with
by aaron
concolic. execution. Suman Jana. *slides . are ....
Adaptive Android Kernel Live Patching
by jane-oiler
Yue . Chen. 1. , . Yulong . Zhang. 2. , . Zhi. ....
I n t e g r i t y - S e r v i
by test
. c. . e - E x c e l l e n c. . e. Headquarter...
Industrial Control System Cybersecurity
by mitsue-stanley
SCADA Security Laboratory. Cyber Kill Chain. Prep...
Assessing the Vulnerabilities of Your Farm or Food business
by debby-jeon
Step one in developing a food defense plan. The F...
Introduction to Stakeholders:
by giovanna-bartolotta
Assessing Hazards, Risks, and Vulnerabilities for...
Towards Automatic S ignature Generation
by calandra-battersby
. of . Vulnerability-based . Signature. By David...
Automatic program generation for detecting vulnerabilities
by karlyn-bohler
. 0368-3500. Nurit. . Dor. Shir. Landau-. Fei...
Ilija Jovičić
by myesha-ticknor
Sophos Consultant. 80%. 10%. 5%. Reduce attack. s...
Detecting Vulnerabilities in Web Code with
by tatiana-dople
concolic. execution. Suman Jana. *slides . are ....
Assessing the Vulnerabilities of Your Farm or Food business
by jane-oiler
Step one in developing a food defense plan. The F...
Web Application Vulnerabilities, Detection Mechanisms, and
by liane-varnes
Shamaria Engram. University of South Florida. Sys...
HIV vulnerabilities of sex workers in Europe
by stefany-barnette
Introduction. Basic facts and figures of the HIV ...
Socializing Attack/
by alexa-scheidler
Defense. . Trees to Prevent Misuse. Özgür. Ka...
Hazards, Risks And Vulnerabilities In The Use Of Public Toi
by debby-jeon
By. Dr . Olajumoke. . Olufemi. For. Prof. A.T. ....
Debate Session (III) – Why risk management and vulnerabil
by calandra-battersby
assessment . is important?. Dr. Ted . Dunstone. ...
Vulnerability Scanning with Credentials
by debby-jeon
Mark pages according to the proprietary level of ...
I n t e g r i t y - S e r v i
by debby-jeon
. c. . e - E x c e l l e n c. . e. Headquarter...
Automatic program generation for detecting vulnerabilities
by tatyana-admore
. 0368-3500. Nurit. . Dor. Shir. Landau-. Fei...
Overlapping Vulnerabilities:
by tatiana-dople
The Occupational Health and Safety of Young Immig...
Social and Ethical Implications
by danika-pritchard
CMSC 101. November 21, 2013. Bhuvana. . Bellala....
Detection of Cyber Vulnerabilities
by lois-ondreau
in . Huge. Networks of . Health. Services. . ...
J Cryptology International Association for Cryptologic Research Small Solutions to Polynomial Equations and Low Exponent RSA Vulnerabilities Don Coppersmith IBM Research T
by cheryl-pisano
Cryptology 1997 10 233260 1997 International Asso...
Statically Detecting Likely Buffer Overflow Vulnerabilities David Larochelle larochellecs
by ellena-manuel
virginiaedu University of Virginia Department of C...
September Bash Environment Variable Injection Vulnerability Statement for Brocade Revision
by conchita-marotz
0 Vulnerabilities CVE20146271 Bash Environmental ...
MDISS and Codenomicon: Fuzz Testing
by tatyana-admore
1 Copyright
II.Social ills138.Although economic factors figure prominentlyamong th
by cheryl-pisano
A/58/153/Rev.1ST/ESA/284 A/58/153/Rev.1ST/ESA/284 ...
Journal of Environmental Science and Management 15(2): 19-34 (December
by cheryl-pisano
ISSN 0119-1144 Social Characteristics and Vulnerab...
Human Development Report 2014
by myesha-ticknor
Sustaining Human Progress: Reducing Vulnerabilitie...
Reducing Alcohol-Related Harm in Older People: A Public Hea
by yoshiko-marsland
Sarah . Wadd. March 2014. Public Health Approach ...
Load More...