<--- Back to Details
First PageDocument Content
Computer network security / Hacking / Software bug / Password / Cross-site scripting / Vulnerability / Kernel / Security token / Two-factor authentication / Computer security / Cyberwarfare / Security
Date: 2012-12-06 13:14:25
Computer network security
Hacking
Software bug
Password
Cross-site scripting
Vulnerability
Kernel
Security token
Two-factor authentication
Computer security
Cyberwarfare
Security

Add to Reading List

Source URL: media.blackhat.com

Download Document from Source Website

File Size: 146,61 KB

Share Document on Facebook

Similar Documents

Logic / Mathematical logic / Non-classical logic / Markov logic network / Software testing / Probabilistic logic / Software bug / Code coverage / Debugging / Inference / First-order logic / Buggy

Software Bug Localization with Markov Logic Sai Zhang Congle Zhang Department of Computer Science & Engineering

DocID: 1xVks - View Document

Software engineering / Software / Code coverage / Software testing / ARG2 / Xdebug / Relational operator / Tarantula / Computer programming

Software Bug Localization with Markov Logic Sai Zhang, Congle Zhang University of Washington Presented by Todd Schiller

DocID: 1xUJM - View Document

Empir Software Eng DOIs10664Toward an understanding of bug fix patterns Kai Pan & Sunghun Kim & E. James Whitehead Jr.

DocID: 1vo53 - View Document

An Extensive Comparison of Bug Prediction Approaches Marco D’Ambros, Michele Lanza REVEAL @ Faculty of Informatics University of Lugano, Switzerland Abstract—Reliably predicting software defects is one of software e

DocID: 1uAgg - View Document

Revisiting Common Bug Prediction Findings Using Effort-Aware Models Yasutaka Kamei† , Shinsuke Matsumoto†† , Akito Monden‡ , Ken-ichi Matsumoto‡ , Bram Adams† and Ahmed E. Hassan† † Software Analysis and

DocID: 1u6CA - View Document