Mitre

Results: 945



#Item
11

MiTAP for Real Users, Real Data, Real Problems

Add to Reading List

Source URL: www.mitre.org

Language: English - Date: 2013-09-07 23:46:32
    12Microsoft Notepad / WordPad / Euclidean vector / Vector / Computer architecture / System software / Software

    Key Details Phrasing Jonathan Evans, MITRE Why have a Description? • Find the CVE for the vulnerability you are looking for

    Add to Reading List

    Source URL: cveproject.github.io

    Language: English - Date: 2018-07-27 07:42:20
    13

    Im p ro p e r ch o ice o f in itia l p ro te ctio n d o m a in i ncor r ect init ial ass i g nment of s ecuri ty or int egri ty l evel at s ys t em init ial i zat i on or generation; a s ec urity c ritic al func tion m a

    Add to Reading List

    Source URL: cwe.mitre.org

    Language: English - Date: 2006-09-13 14:57:18
      14

      Annotated Sequence Diagrams Jonathan K. Millen and John D. Ramsdell The MITRE Corporation Bedford, MA USA Abstract. An annotated sequence diagram (ASD) is a representation

      Add to Reading List

      Source URL: jonmillen.com

      Language: English - Date: 2017-01-20 09:49:26
        15

        DR. JUDITH DAHMANN is a principal senior scientist in the MITRE Corporation Center for the MITRE Systems Enginering Technical Center and the Capability Action Team leader for Systems of Systems (SoS). Dr

        Add to Reading List

        Source URL: sosengineering.org

        Language: English - Date: 2017-12-20 04:12:18
          16

          A Status Update: The Common Weaknesses Enumeration Robert A. Martin Sean Barnum MITRE Corporation

          Add to Reading List

          Source URL: cwe.mitre.org

          Language: English - Date: 2006-09-14 16:17:05
            17

            O V E R - U n b o u n d e d Tra n sfe r (’cla ssic o ve rflo w ’) U N D E R - B o u n d a ry b e g in n in g vio la tio n (’b u ffe r u n d e rflo w ’ ? ) the produc t writes at leas t part of the data before the

            Add to Reading List

            Source URL: cwe.mitre.org

            Language: English - Date: 2006-09-13 14:57:16
              18

              B u ffe r o ve rflo w A buffer overflow condition exists when a program attem pts to put m ore data in a buffer than it can hold or when a program attem pts to put data in a m em ory area past a buffer. In this case, a b

              Add to Reading List

              Source URL: cwe.mitre.org

              Language: English - Date: 2006-09-13 14:57:15
                19

                Charged Particles for Emerging Interdisciplinary Applications Samar K Guharay* The MITRE Corporation McLean, VA 22102, USA Significant progress has been made in the science and technology of charged-particle sources,

                Add to Reading List

                Source URL: www.ppl.k.u-tokyo.ac.jp

                Language: English - Date: 2017-09-28 00:38:20
                  20

                  A Taxonomy of UNIX System and Network Vulnerabilities Matt Bishop CSEMay 1995

                  Add to Reading List

                  Source URL: cwe.mitre.org

                  Language: English - Date: 2006-09-13 14:57:15
                    UPDATE