Vulnerability

Results: 14773



#Item
1Computer security / Security engineering / Prevention / Cyberwarfare / Vulnerability / Cryptography / National security / HackerOne / Application security / Bug bounty program / General Data Protection Regulation / Social vulnerability

1 Software Vulnerability Disclosure in Europe: Summary and Key Highlights of the European Parliament

Add to Reading List

Source URL: www.hackerone.com

Language: English - Date: 2018-08-28 15:00:43
2Computer security / Prevention / Security engineering / Cyberwarfare / Vulnerability / Cryptography / National security / HackerOne / Bug bounty program / Information security / Social vulnerability

What is a Vulnerability Disclosure Policy and Why You Need One VDPs work and they protect assets. That’s why the U.S. Department of Justice, the European Commission, and the U.S. Food & Drug Administration recommend th

Add to Reading List

Source URL: www.hackerone.com

Language: English - Date: 2018-08-30 11:58:33
3Cryptography / Public-key cryptography / Post-quantum cryptography / Hashing / Hash-based cryptography / XMSS / Cryptographic hash function / Merkle signature scheme / Digital signature / HMAC / RSA / Power analysis

Physical Attack Vulnerability of Hash-Based Signature Schemes Verwundbarkeit von Hash-basierten Signaturverfahren durch Physikalische Angriffe Master-Thesis von Matthias Julius Kannwischer Tag der Einreichung:

Add to Reading List

Source URL: kannwischer.eu

Language: English - Date: 2018-06-25 08:42:52
4Sponsor / Value-added tax / TED / Culture / Terminology / Human behavior

DIMVA Dear Prospective Sponsor. Since 2004 and 2009 the annual international IT-Security conferences DIMVA (Detection of Intrusions and Malware & Vulnerability Assessment) and ESSOS (Engineering Secure Software and Syste

Add to Reading List

Source URL: itsec.cs.uni-bonn.de

Language: English - Date: 2017-04-24 03:56:14
5Mathematics / Electromagnetism / Electric power / Electrical engineering / Power engineering / Power-flow study / Parameter / Variable

Automated Vulnerability Analysis of AC State Estimation under Constrained False Data Injection in Electric Power Systems Sicun Gao1 , Le Xie2 , Armando Solar-Lezama1 , Dimitrios Serpanos3 , and Howard Shrobe1 Abstract—

Add to Reading List

Source URL: scungao.github.io

Language: English - Date: 2018-09-27 16:37:21
6

Linking substrate and habitat requirements of woodinhabiting fungi to their regional extinction vulnerability

Add to Reading List

Source URL: www.mv.helsinki.fi

Language: English - Date: 2015-05-05 07:14:56
    7

    Seminar Announcement Neurobiology of resilience and vulnerability to stress Date: 22 April 2016 Friday

    Add to Reading List

    Source URL: www.sbs.ntu.edu.sg

    Language: English - Date: 2016-04-27 22:32:08
      8

      Reporting Status of Vulnerability-related Information about Software Products and Websites - 4th Quarter ofOctober – December) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency

      Add to Reading List

      Source URL: www.ipa.go.jp

      Language: English - Date: 2018-08-07 23:07:26
        9

        You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications Frank Li, University of California, Berkeley; Zakir Durumeric, University of Michigan, University of Illinois at Urbana–Champaign, and Interna

        Add to Reading List

        Source URL: nsrg.ece.illinois.edu

        Language: English - Date: 2018-06-11 12:51:20
          UPDATE