Common Vulnerabilities and Exposures

Results: 109



#Item
11ESET_Logo_HorizontalClaim-White

ESET_Logo_HorizontalClaim-White

Add to Reading List

Source URL: www.welivesecurity.com

Language: English - Date: 2016-01-22 06:05:11
12doicomjnl/bxu101

doicomjnl/bxu101

Add to Reading List

Source URL: comjnl.oxfordjournals.org

Language: English
13Vulnerabilities  At a glance Description  A look into software vulnerabilities, whether we are

Vulnerabilities At a glance Description A look into software vulnerabilities, whether we are

Add to Reading List

Source URL: www.kennasecurity.com

Language: English - Date: 2016-04-26 13:43:51
14Crypto year in review Sept 2014 Bill Ricker for BLU.org Size matters *Current recommended key sizes.*

Crypto year in review Sept 2014 Bill Ricker for BLU.org Size matters *Current recommended key sizes.*

Add to Reading List

Source URL: www.blu.org

Language: English - Date: 2014-10-02 16:10:38
15Hot-Patching a Web Server: a Case Study of ASAP Code Repair Mathias Payer Thomas R. Gross

Hot-Patching a Web Server: a Case Study of ASAP Code Repair Mathias Payer Thomas R. Gross

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
16OS Diversity for Intrusion Tolerance: Myth or Reality? Miguel Garcia∗ , Alysson Bessani∗ , Ilir Gashi† , Nuno Neves∗ and Rafael Obelheiro‡ ∗ LaSIGE, University of Lisbon, Faculty of Sciences – Lisbon, Portu

OS Diversity for Intrusion Tolerance: Myth or Reality? Miguel Garcia∗ , Alysson Bessani∗ , Ilir Gashi† , Nuno Neves∗ and Rafael Obelheiro‡ ∗ LaSIGE, University of Lisbon, Faculty of Sciences – Lisbon, Portu

Add to Reading List

Source URL: www.di.fc.ul.pt

Language: English - Date: 2011-04-15 13:02:34
17SOFTWARE – PRACTICE AND EXPERIENCE Softw. Pract. ExperPublished online in Wiley Online Library (wileyonlinelibrary.com). DOI: spe.2180 Analysis of operating system diversity for intrusion tolerance Mig

SOFTWARE – PRACTICE AND EXPERIENCE Softw. Pract. ExperPublished online in Wiley Online Library (wileyonlinelibrary.com). DOI: spe.2180 Analysis of operating system diversity for intrusion tolerance Mig

Add to Reading List

Source URL: www.di.fc.ul.pt

Language: English - Date: 2013-01-18 09:24:08
18Timing the Application of Security Patches for Optimal Uptime Steve Beattie, Seth Arnold, Crispin Cowan, Perry Wagle, and Chris Wright † – WireX Communications, Inc. Adam Shostack – Zero Knowledge Systems, Inc. ABS

Timing the Application of Security Patches for Optimal Uptime Steve Beattie, Seth Arnold, Crispin Cowan, Perry Wagle, and Chris Wright † – WireX Communications, Inc. Adam Shostack – Zero Knowledge Systems, Inc. ABS

Add to Reading List

Source URL: adam.shostack.org

Language: English - Date: 2014-06-11 11:42:33
19EVENT TYPE DEFINITIONS AND GUIDELINES MEETING: • •

EVENT TYPE DEFINITIONS AND GUIDELINES MEETING: • •

Add to Reading List

Source URL: inside.massart.edu

Language: English - Date: 2016-03-04 20:59:24
20Standards in reporting Software Flaws: SCAP, CVE and CWE Robin A. Gandhi, Ph.D. University of Nebraska at Omaha (UNO) College of Information Science and Technology (IS&T) School of Interdisciplinary Informatics (Si2)

Standards in reporting Software Flaws: SCAP, CVE and CWE Robin A. Gandhi, Ph.D. University of Nebraska at Omaha (UNO) College of Information Science and Technology (IS&T) School of Interdisciplinary Informatics (Si2)

Add to Reading List

Source URL: www.nebraskacert.org

Language: English - Date: 2010-05-19 17:57:00