Discovery science

Results: 3647



#Item
531Cryptographic protocols / Public-key cryptography / Key management / PKI Resource Query Protocol / Online Certificate Status Protocol / SCVP / Public key infrastructure / Dynamic Host Configuration Protocol / X.509 / Cryptography / Internet protocols / Internet standards

AutoPKI: a PKI Resources Discovery System? Massimiliano Pala and Sean W. Smith Dartmouth College, Computer Science Department, 6211 Sudikoff, Hanover, NH 03755, US {pala,sws}@cs.dartmouth.edu http://www.cs.dartmouth.edu

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2007-04-29 13:13:22
532Software bugs / C Standard Library / Memory management / Address space layout randomization / PaX / C dynamic memory allocation / Exec Shield / Return-to-libc attack / Relocation / Computing / Computer programming / Software

Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software Chongkyung Kil∗, Jinsuk Jun∗, Christopher Bookholt∗, Jun Xu†, Peng Ning∗ Department of Computer Science∗ North

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:57
533Alert correlation

Building Attack Scenarios through Integration of Complementary Alert Correlation Methods ∗ Peng Ning, Dingbang Xu, Christopher G. Healey, and Robert St. Amant Cyber Defense Laboratory Department of Computer Science Nor

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:13
    534Clinical research / Pharmaceutical industry / Clinical pharmacology / Pharmacy / Food and Drug Administration / Regulatory science / Medical device / Drug discovery / Clinical trial / Pharmaceutical sciences / Medicine / Pharmacology

    <4D6963726F736F667420506F776572506F696E74202D20817948508C668DDA8DB782B591D682A6817A8E9F90A291E390528DB8918A926B91CC90A72E70707478>

    Add to Reading List

    Source URL: www.pmda.go.jp

    Language: English - Date: 2015-05-12 07:05:14
    535Sensor node / Computing / Electronics / Network theory / Wireless sensor network / Technology / Wireless networking

    A Framework for Identifying Compromised Nodes in Sensor Networks Qing Zhang Ting Yu Peng Ning Department of Computer Science North Carolina State University

    Add to Reading List

    Source URL: discovery.csc.ncsu.edu

    Language: English - Date: 2011-11-09 13:26:16
    536Drug discovery / High-throughput screening / Pharmaceutics / Pharmaceutical industry / Clinical research / Plate reader / Assay / Central Drug Research Institute / Pharmaceutical sciences / Pharmacology / Science

    High Throughput Drug Screening Center at The Hong Kong University of Science and Technology’s Biotechnology

    Add to Reading List

    Source URL: www.bri.ust.hk

    Language: English - Date: 2006-12-11 22:32:55
    537Medicinal chemistry / Standards organizations / Pharmacology / Cheminformatics / International Union of Basic and Clinical Pharmacology / C. Robin Ganellin / International Federation of Clinical Chemistry and Laboratory Medicine / Drug discovery / Toxicology / Pharmaceutical sciences / Science / Chemistry

    DIVISION VII Chemistry and Human health Minutes Division Committee Meeting held at the IUPAC GA in Brisbane, 29 June – 4 July 2001

    Add to Reading List

    Source URL: old.iupac.org

    Language: English - Date: 2002-01-31 09:34:58
    538Data / Web Ontology Language / Open Biomedical Ontologies / Description logic / Upper ontology / Semantic interoperability / Ontology / Information / Science

    VOTECH The European Virtual Observatory VO Technology Center DS5 – Intelligent Resource Discovery Study Report

    Add to Reading List

    Source URL: www.eurovotc.org

    Language: English - Date: 2014-12-03 06:33:30
    539Commercialization of traditional medicines / Medicinal chemistry / Biodiversity / Sustainable development / Environmental science / Traditional knowledge / Convention on Biological Diversity / Commercialization of indigenous knowledge / Drug discovery / Science / Pharmaceutical sciences / Knowledge

    Pure & Appl. Chern., Vol. 68, No. 12, pp. Printed in Great Britain. Q 1996 IUPAC INTERNATIONAL UNION OF PURE

    Add to Reading List

    Source URL: old.iupac.org

    Language: English - Date: 2004-06-03 17:12:15
    540Software bugs / Computer errors / Assembly languages / Buffer overflow / Stack buffer overflow / Denial-of-service attack / Stack / Call stack / Address space layout randomization / Computing / Software engineering / Computer programming

    Automatic Diagnosis and Response to Memory Corruption Vulnerabilities Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris Bookholt Cyber Defense Laboratory Department of Computer Science North Carolina State University

    Add to Reading List

    Source URL: discovery.csc.ncsu.edu

    Language: English - Date: 2011-11-09 13:26:02
    UPDATE