Exploit

Results: 786



#Item
501Software bugs / Computer worms / Hacking / Software testing / Computer network security / Buffer overflow / Vulnerability / SQL Slammer / Blaster / Computer security / Cyberwarfare / System software

Network Worms Countering Network Worms Through Automatic Patch Generation To counter zero-day worms that exploit software flaws

Add to Reading List

Source URL: www1.cs.columbia.edu

Language: English - Date: 2005-11-02 15:56:06
502Cloning / Genomics / Omics / Stem cell / Adult stem cell / Biology / Stem cells / Biotechnology

4th World Congress on Cell Science & Stem Cell Research to Exploit the Latest Advancements OMICS Group International: 4th World Congress that is going to be held during June 24-26, 2014 at Valencia, Spain on Cell Science

Add to Reading List

Source URL: www.prweb.com

Language: English - Date: 2014-03-18 09:06:38
503Heuristics / Multi-armed bandit / Statistical hypothesis testing / Normal distribution / Statistics / Design of experiments / Heuristic function

Proceedings of the IEEE Conf. on Decision and Control, Maui, HI, 2012 Towards optimization of a human-inspired heuristic for solving explore-exploit problems Paul Reverdy1 , Robert C. Wilson2 , Philip Holmes1,3 and Naom

Add to Reading List

Source URL: www.princeton.edu

Language: English - Date: 2012-09-07 12:48:01
504Topic model / Artificial intelligence / Dynamic topic model / Statistical natural language processing / Statistics / Latent Dirichlet allocation

From Topic Models to Semi-Supervised Learning: Biasing Mixed-membership Models to Exploit Topic-Indicative Features in Entity Clustering Ramnath Balasubramanyan1 , Bhavana Dalvi1 , and William W. Cohen1,2 {rbalasub,bbd,w

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2013-07-01 09:45:45
505Abuse / Human behavior / Child abuse / Family therapy / Laws regarding child sexual abuse / Child pornography / Catholic sex abuse cases / Sexual abuse / Child sexual abuse / Human sexuality

STATEMENT OF ACTION: WEPROTECT SUMMIT[removed]DEC 2014 We, the leaders of countries, law enforcement agencies and international organisations, are appalled by the continued abuse of the internet to exploit children for sex

Add to Reading List

Source URL: www.gov.uk

Language: English - Date: 2014-12-11 14:00:10
506Network performance / Computer networking / Teletraffic / Electronics / Telecommunications engineering / Quality of service / Packet switching / Random neural network / Erol Gelenbe / Computing / Network architecture / Streaming

1 Self-Aware Networks and QoS Erol Gelenbe, Fellow IEEE, Ricardo Lent, Arturo Nunez Abstract— Novel user oriented networked systems will simultaneously exploit a variety of wired and wireless communication modalities

Add to Reading List

Source URL: san.ee.ic.ac.uk

Language: English - Date: 2004-05-20 10:55:14
507Architecture / Computer-aided design / Construction / Data modeling / Generative Design / Revit / Design methods / Autodesk / Minimalist program / Building information modeling / Visual arts / Design

www.itcon.org - Journal of Information Technology in Construction - ISSN[removed]INTEGRATION OF BIM AND GENERATIVE DESIGN TO EXPLOIT AEC CONCEPTUAL DESIGN INNOVATION SUBMITTED: August 2013 REVISED: December 2013

Add to Reading List

Source URL: itcon.org

Language: English - Date: 2014-09-09 07:48:29
508Computer security / Malware / Norton AntiVirus / Antivirus software / System software / Software

Testing Exploit-Prevention Mechanisms in Anti-Malware Products Andreas Marx & Maik Morgenstern AV-Test GmbH, Magdeburg, Germany http://www.av-test.org Presented at the CARO Workshop 2009

Add to Reading List

Source URL: www.av-test.org

Language: English - Date: 2011-08-07 07:52:49
509Password / Challenge-response authentication / Two-factor authentication / Salt / Authentication / Passphrase / Password policy / Password strength / Security / Computer security / Cryptography

Chapter 5 Authentication for People The challenge is to devise authentication methods that exploit the strengths yet accommodate the weaknesses of our human minds and bodies. Computers are great at doing cryptographic c

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-10 22:01:10
510Social media / Real-time web / Text messaging / Twitter / Websites / Uniform resource locator / Malware / URL shortening / Spam / Internet / Computing / Technology

It’s you on photo?: Automatic Detection of Twitter Accounts Infected With the Blackhole Exploit Kit Joshua S. White Jeanna N. Matthews

Add to Reading List

Source URL: people.clarkson.edu

Language: English - Date: 2013-09-15 08:36:57
UPDATE