Randomization

Results: 457



#Item
361Failure / Hacking / Vulnerability / Patch / Address space layout randomization / Social vulnerability / Arbitrary code execution / Computer security / Cyberwarfare / Software testing

Immunity White Paper A Bounds Check on the Microsoft Exploitability Index Bas Alberts, Senior Researcher, Immunity, Inc[removed]

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2009-01-13 10:48:07
362Shellcode / Software bugs / Buffer overflow / Polymorphic code / Arbitrary code execution / Self-modifying code / Computer virus / Address space layout randomization / Metasploit Project / Computing / Computer security / Cyberwarfare

J Comput Virol[removed]:257–274 DOI[removed]s11416[removed]z O R I G I NA L PA P E R Network-level polymorphic shellcode detection using emulation

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2009-10-19 10:25:58
363Software bugs / C Standard Library / Stack buffer overflow / Buffer overflow / Subroutines / Address space layout randomization / Return-to-libc attack / NX bit / Pointer / Computing / Software engineering / Computer programming

2013 IEEE Symposium on Security and Privacy Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2013-05-28 17:28:59
364Information / Evaluation methods / Experiment / Restricted randomization / Statistics / Science / Design of experiments

Multi-Environment Experiments in Agriculture G.H. Crow Department of Animal Science University of Manitoba CSSS-CSA-2010 Statistics workshop

Add to Reading List

Source URL: www.agronomycanada.com

Language: English - Date: 2012-10-30 22:30:14
365Epidemiologists / Health in the United Kingdom / Medical Research Council / Medical research / Science and technology in the United Kingdom / Canadian Institutes of Health Research / Avon Longitudinal Study of Parents and Children / Genetic epidemiology / Mendelian randomization / Health / Medicine / Epidemiology

Prof. George Davey Smith Director, Avon Longitudinal Study of Parents and their Children Director, MRC Centre for Causal Analyses in Translational Epidemiology

Add to Reading List

Source URL: www.stage.utoronto.ca

Language: English - Date: 2013-04-22 22:51:23
366

Randomization and Enrollment Form

Add to Reading List

Source URL: www.nia.nih.gov

- Date: 2014-04-21 12:42:22
    367Medicaid / Medicare / Healthcare Cost and Utilization Project / Randomization / Government / Health / Science / Healthcare reform in the United States / Federal assistance in the United States / Presidency of Lyndon B. Johnson

    THE OREGON HEALTH INSURANCE EXPERIMENT: EVIDENCE FROM THE FIRST YEAR APPENDICES Appendix 1: Analytic sample, data sources and outcome variables ....................................................... 4 1.1 Construction o

    Add to Reading List

    Source URL: www.nber.org

    Language: English - Date: 2014-01-02 14:14:40
    368Scientific method / Econometrics / Observational study / Evaluation methods / Philosophy of science / Impact evaluation / Randomized controlled trial / Regression discontinuity design / Randomization / Statistics / Design of experiments / Science

    Categorical Variables and Functional Form

    Add to Reading List

    Source URL: www.doleta.gov

    Language: English - Date: 2012-06-21 13:46:43
    369Extracorporeal membrane oxygenation / Clinical trial / Sequential analysis / Randomization / Estimation theory / Predictive analytics / Cytel / Randomized experiment / Statistics / Design of experiments / Science

    Bayesian and “Small n” Trials

    Add to Reading List

    Source URL: www.fda.gov

    Language: English
    370Software bugs / Cross-platform software / Heap spraying / Shellcode / Buffer overflow / Address space layout randomization / NOP slide / JavaScript / Garbage collection / Computing / Cyberwarfare / Computer security

    N OZZLE: A Defense Against Heap-spraying Code Injection Attacks Paruj Ratanaworabhan Cornell University Benjamin Livshits

    Add to Reading List

    Source URL: research.microsoft.com

    Language: English - Date: 2009-06-08 14:53:11
    UPDATE