CAPEC

Results: 32



#Item
21Anatomy / Vaccination / Pediatrics / Immune system / Vaccines / Measles / Rubella / T helper cell / Peripheral blood mononuclear cell / Biology / Medicine / Immunology

Successful respiratory immunization with dry powder live-attenuated measles virus vaccine in rhesus macaques Wen-Hsuan Lina, Diane E. Griffina,1, Paul A. Rotab, Mark Papaniab, Stephen P. Capec, David Bennettd, Brian Qui

Add to Reading List

Source URL: www.aktiv-dry.com

Language: English - Date: 2011-04-14 17:46:04
22United States Department of Homeland Security / Government / Public safety / Public administration / Mitre Corporation / United States Department of Defense / Attack patterns

Understanding How They Attack Your Weaknesses: CAPEC Sean Barnum MITRE

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:14
23Computing / Cyberwarfare / Email / Social engineering / Vulnerability / Hacking / Software testing / Computer security

CAPEC Content Submission Form

Add to Reading List

Source URL: capec.mitre.org

Language: English - Date: 2013-07-25 16:42:45
24Software development process / Science / Access control / Capability-based security / Requirement

Requirements and Recommendations for CAPEC Compatibility

Add to Reading List

Source URL: capec.mitre.org

Language: English - Date: 2013-04-02 14:28:02
25Computer network security / Cyberwarfare / Security / Software quality / National security / Attack patterns / Software assurance / Vulnerability / Penetration test / Software testing / Computer security / Hacking

An Introduction to Attack Patterns as a Software Assurance Knowledge Resource OMG Software Assurance Workshop 2007

Add to Reading List

Source URL: capec.mitre.org

Language: English - Date: 2007-03-13 14:59:21
26Software testing / Computing / Computer network security / Attack patterns / Vulnerability / Application security / Exploit / Buffer overflow / SQL injection / Cyberwarfare / Computer security / Hacking

Attack Patterns as a Knowledge Resource for Building Secure Software Sean Barnum Amit Sethi

Add to Reading List

Source URL: capec.mitre.org

Language: English - Date: 2007-03-13 14:59:22
27Cyberwarfare / Security / Computer network security / National security / Attack patterns / Vulnerability / Software assurance / Hacking / Software testing / Computer security

Attack Patterns: Knowing Your Enemy in Order to Defeat Them BlackHat DC[removed]Software Confidence. Achieved.

Add to Reading List

Source URL: capec.mitre.org

Language: English - Date: 2007-03-13 14:59:22
28Cyberwarfare / Computing / Attack patterns / Computer network security / Vulnerability / Attack / Sequence container / Hacking / Software testing / Computer security

Common Attack Pattern Enumeration and Classification (CAPEC™): Schema Description Version 2.6 Schema Element Name Description

Add to Reading List

Source URL: capec.mitre.org

Language: English - Date: 2013-07-25 15:52:47
29Cyberwarfare / Computer network security / Computing / Attack patterns / Vulnerability / Attack / Sequence container / Exploit / Mitre Corporation / Hacking / Software testing / Computer security

Common Attack Pattern Enumeration and Classification (CAPEC™) Schema Description Version 2.5 Schema Element Name Description

Add to Reading List

Source URL: capec.mitre.org

Language: English - Date: 2013-06-17 16:53:46
30Economics / Energy policy / Industrial ecology / Energy conservation / Environmental issues with energy / Sustainable building / Low-carbon economy / Sustainable energy / Green economy / Environment / Energy economics / Sustainability

2013 International Forum on Low Carbon Industry and Green Economy Nov[removed], 2013 Beijing International Convention Center On Nov[removed], 2013, China Association of Plant Engineering Consultants (CAPEC), in

Add to Reading List

Source URL: www.chinalce.eu

Language: English - Date: 2013-09-25 03:01:13
UPDATE