Security analysis

Results: 6956



#Item
211Formal methods / Static program analysis / Theoretical computer science / Safety / Computer security / Safety case / KeY / Hoare logic / Formal verification / Proof-carrying code / Hazard analysis / Loop invariant

Constructing a Safety Case for Automatically Generated Code from Formal Program Verification Information Nurlida Basir1 , Ewen Denney2 , and Bernd Fischer1 1

Add to Reading List

Source URL: ti.arc.nasa.gov

Language: English
212Information technology management / Data management / Crime prevention / Cryptography / National security / Database / Data warehouse / Computer security / Data analysis

UW DATA MANAGEMENT COMMITTEE (DMC) Security Access and Roles Privilege Matrix for READ-ONLY Access to Enterprise Data Warehouse Data – Version 21 Approved By: Modified By: DMC Access & Roles Task Force

Add to Reading List

Source URL: www.washington.edu

Language: English - Date: 2015-07-17 12:24:26
213Recursion / Theoretical computer science / Formal methods / Compiler optimizations / Infinite loop / Satisfiability modulo theories / Control flow / For loop / Algorithm / Termination analysis / Loop unrolling / Satisfiability

A Fixed-Point Algorithm for Automated Static Detection of Infinite Loops Andreas Ibing, Alexandra Mai Chair for IT Security TU M¨unchen Boltzmannstrasse 3, 85748 Garching, Germany {ibing,mai}@sec.in.tum.de

Add to Reading List

Source URL: www.sec.in.tum.de

Language: English - Date: 2016-02-01 08:36:29
214Environmentalism / Sustainability / Energy development / Food security / Environmental impact of the energy industry

Research Paper Rabi H. Mohtar and Bassel Daher Energy, Environment and Resources | December 2014 A Platform for Trade-off Analysis and Resource Allocation

Add to Reading List

Source URL: wefnexus.tamu.edu

Language: English - Date: 2015-03-06 11:54:32
215Generally Accepted Accounting Principles / Corporate finance / Fundamental analysis / Cyberwarfare / Internet Relay Chat / Gross profit / Earnings before interest /  taxes /  depreciation /  and amortization / Income / DDoS mitigation / Cash and cash equivalents / Balance sheet / Depreciation

21 AprilCorero Network Security plc (AIM: CNS) (“Corero” or the “Company”) Full year results

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2016-04-21 02:05:34
216Computer networking / Internet privacy / Network performance / Proxy server / Transmission Control Protocol

Presentation Introduction Overview and first clues Protocol analysis Short security analysis

Add to Reading List

Source URL: esec-lab.sogeti.com

Language: English - Date: 2016-07-01 12:08:46
217Computing platforms / Software metrics / Linux kernel / LLVM / Clang / Linux / Kernel / Source lines of code / Compiler / Mach

Research Report: Analysis of Software for Restricted Computational Environment Applicability Jacob I. Torrey and Jonathan Miodownik Assured Information Security Greenwood Village, CO, USA {torreyj, miodownikj}@ainfosec.c

Add to Reading List

Source URL: spw16.langsec.org

Language: English - Date: 2016-06-05 23:38:45
218SQL / Data management / SQL injection / Application server / Web application security / PL/SQL

Findings Security Errors in Java Applications Using Lightweight Static Analysis V. Benjamin Livshits Computer Systems Laboratory Stanford University Stanford, CA 94305

Add to Reading List

Source URL: suif.stanford.edu

Language: English - Date: 2004-09-23 20:31:47
219Environmental economics / Food politics / Systems thinking / Special Report on Emissions Scenarios / Food security / IPCC Fourth Assessment Report / Food and Agriculture Organization / Intergovernmental Panel on Climate Change / Global Scenario Group / International Food Policy Research Institute / Futures studies / Food safety

GECAFS Working Paper 1  A Short Review of Global Scenarios for Food Systems  Analysis  Monika B. Zurek  ESAC, FAO, Rome 

Add to Reading List

Source URL: www.gecafs.org

Language: English - Date: 2009-07-22 05:57:37
220Security / Intelligence analysis / Military intelligence / Finnish Security Intelligence Service / Counterintelligence / Espionage / Swedish Security Service / Secretariat of Intelligence / Defense Intelligence Agency / Intelligence agency / National Bureau of Investigation / Counter-terrorism

SUPO_logo_vertical_nega_cmyk

Add to Reading List

Source URL: www.supo.fi

Language: English - Date: 2016-04-22 03:42:32
UPDATE