Bug

Results: 5022



#Item
1Software Bug Localization with Markov Logic Sai Zhang Congle Zhang  Department of Computer Science & Engineering

Software Bug Localization with Markov Logic Sai Zhang Congle Zhang Department of Computer Science & Engineering

Add to Reading List

Source URL: zhang-sai.github.io

Language: English - Date: 2015-05-05 00:58:34
2Software Bug Localization with Markov Logic Sai Zhang, Congle Zhang University of Washington Presented by Todd Schiller

Software Bug Localization with Markov Logic Sai Zhang, Congle Zhang University of Washington Presented by Todd Schiller

Add to Reading List

Source URL: zhang-sai.github.io

Language: English - Date: 2015-05-05 00:58:35
3Invest in future. Invest in your side of the firewall We provide individualized service based on peculiarities of your code and cybersecurity perimeter and offer wide customization options for each bug bounty program tha

Invest in future. Invest in your side of the firewall We provide individualized service based on peculiarities of your code and cybersecurity perimeter and offer wide customization options for each bug bounty program tha

Add to Reading List

Source URL: hacken.io

Language: English - Date: 2017-10-12 11:58:38
4Invest in future. Invest in your side of the firewall We provide individualized service based on peculiarities of your code and cybersecurity perimeter and offer wide customization options for each bug bounty program tha

Invest in future. Invest in your side of the firewall We provide individualized service based on peculiarities of your code and cybersecurity perimeter and offer wide customization options for each bug bounty program tha

Add to Reading List

Source URL: hacken.io

Language: English - Date: 2017-10-12 11:58:32
5Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts Lorenz Breidenbach, Cornell Tech, IC3, ETH Zurich; Philip Daian, Cornell Tech, IC3; Florian Tramer, Stanford; Ari Juels, Cornell Tech

Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts Lorenz Breidenbach, Cornell Tech, IC3, ETH Zurich; Philip Daian, Cornell Tech, IC3; Florian Tramer, Stanford; Ari Juels, Cornell Tech

Add to Reading List

Source URL: www.usenix.org

Language: English
6Invest in future. Invest in your side of the firewall We provide individualized service based on peculiarities of your code and cybersecurity perimeter and offer wide customization options for each bug bounty program tha

Invest in future. Invest in your side of the firewall We provide individualized service based on peculiarities of your code and cybersecurity perimeter and offer wide customization options for each bug bounty program tha

Add to Reading List

Source URL: hacken.io

Language: English - Date: 2017-10-05 12:05:10
7

PDF Document

Add to Reading List

Source URL: www.hug-a-bug.com

- Date: 2009-02-26 22:56:38
    8

    PDF Document

    Add to Reading List

    Source URL: www.hug-a-bug.com

    - Date: 2009-02-26 22:56:58
      9

      PDF Document

      Add to Reading List

      Source URL: www.hug-a-bug.com

      - Date: 2009-02-26 22:59:40
        10MO-ITA-BUG-base10-17

        MO-ITA-BUG-base10-17

        Add to Reading List

        Source URL: www.ormesa.com

        Language: Italian - Date: 2017-11-17 02:34:55