Attack patterns

Results: 58



#Item
21Computer network security / Hacking / Security / Attack patterns / Vulnerability / Application security / Penetration test / Buffer overflow / Port scanner / Computer security / Cyberwarfare / Software testing

Matching Attack Signatures to Security Vulnerabilities in Software-Intensive System Designs

Add to Reading List

Source URL: collaboration.csc.ncsu.edu

Language: English - Date: 2013-04-11 05:18:10
22Computer network security / Software testing / Hacking / PHP programming language / SQL / SQL injection / Cross-site scripting / Attack patterns / Denial-of-service attack / Computer security / Cyberwarfare / Computing

WEB APPLICATION ATTACK REPORT #5 Edition #5 - October 2014 PHP APPLICATIONS

Add to Reading List

Source URL: www.imperva.com

Language: English - Date: 2014-10-06 14:22:07
23SHA-1 / Preimage attack / MD5 / MD4 / Padding / RIPEMD / Collision attack / Birthday attack / Hash function / Cryptographic hash functions / Cryptography / SHA-2

On Corrective Patterns for the SHA-2 Family Philip Hawkes1 , Michael Paddon1 , and Gregory G. Rose1 Qualcomm Australia, Level 3, 230 Victoria Rd, Gladesville, NSW 2111, Australia {phawkes,mwp,ggr}@qualcomm.com Abstract.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-08-22 14:38:17
24Structure / Digital art / Fractal / Topology / Dimension theory / Cancer / Pattern / Metastasis / Fractal dimension / Fractals / Medicine / Dimension

Fractal patterns may uncover new line of attack on cancer

Add to Reading List

Source URL: phys.org

Language: English - Date: 2015-03-18 18:54:01
25Computer security / Supply chain management / Hacking / Software testing / Attack / Vulnerability / Threat / Supply chain / Malware / Cyberwarfare / Computer network security / Business

Supply Chain Attack Framework and Attack Patterns

Add to Reading List

Source URL: www.mitre.org

Language: English - Date: 2014-06-16 14:43:58
26Wind / Foehn wind / Wildfire / Ember / Ember attack / Atmospheric sciences / Meteorology / Fire

VARIATIONS ON DIURNAL WEATHER CYCLE These may occur with various Wind Speed timings & patterns. Fire Danger

Add to Reading List

Source URL: www.highfirerisk.com.au

Language: English - Date: 2010-10-14 21:04:42
27United States Department of Homeland Security / Government / Public safety / Public administration / Mitre Corporation / United States Department of Defense / Attack patterns

Understanding How They Attack Your Weaknesses: CAPEC Sean Barnum MITRE

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:14
28Shark attack / Shark / Atlantic tarpon / Bull shark / Fish / Sharks / Carcharhinidae

A Comparison of Spatial and Movement Patterns between Sympatric Predators: Bull Sharks (Carcharhinus leucas) and Atlantic Tarpon (Megalops atlanticus) Neil Hammerschlag1,2,3*, Jiangang Luo1, Duncan J. Irschick4, Jerald S

Add to Reading List

Source URL: rjd.miami.edu

Language: English - Date: 2012-10-05 13:41:05
29Computer security / Security / Vulnerability / Computer network security / Software bugs / Application security / GrammaTech / Memory safety / Attack patterns / Software testing / Cyberwarfare / Hacking

Securely Taking on New Executable Software of Uncertain Provenance (STONESOUP) Neutralizing Exploitable Vulnerabilities in Software Program Manager: Mr. W. Konrad Vesey; E-mail: [removed] How can we benefit

Add to Reading List

Source URL: www.iarpa.gov

Language: English - Date: 2014-11-12 11:22:59
30Data mining / Attack patterns / Honeynet Project / Computer network security / Spamming / Honeypot

A FRAMEWORK FOR ATTACK PATTERNS’ DISCOVERY IN HONEYNET DATA August 13th, 2008 Olivier Thonnard Royal Military Academy

Add to Reading List

Source URL: www.dfrws.org

Language: English - Date: 2008-08-21 00:22:11
UPDATE