Vulnerability

Results: 14773



#Item
941

• Android Tapjacking Vulnerability • Android Tapjacking Vulnerability Benjamin Lim (A0100223) National University of Singapore

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2015-08-02 20:29:30
    942Cyberwarfare / Computer security / Security / Computer network security / Software testing / Software bugs / Hacking / Vulnerability / Buffer overflow protection / Exploit / Attack

    Relative Vulnerability: An Empirical Assurance Metric Crispin Cowan, PhD CTO, Immunix

    Add to Reading List

    Source URL: adam.shostack.org

    Language: English - Date: 2014-06-11 11:49:30
    943

    The Minimum Vulnerability Problem on Graphs Yusuke Aoki1 , Bjarni V. Halld´orsson2 , Magn´ us M. Halld´orsson2⋆ , 1⋆⋆ 2 Takehiro Ito , Christian Konrad , and Xiao Zhou1

    Add to Reading List

    Source URL: www.christiankonrad.de

    Language: English - Date: 2015-06-16 06:49:15
      944

      Functional Ecologydoi: j01987.x Geographic variation in vulnerability to climate warming in a tropical Caribbean lizard

      Add to Reading List

      Source URL: www.chipojolab.org

      Language: English - Date: 2012-09-14 13:46:13
        945

        Replace this file with prentcsmacro.sty for your meeting, or with entcsmacro.sty for your meeting. Both can be found at the ENTCS Macro Home Page. Analysing the vulnerability of protocols to produce known-pair and chosen

        Add to Reading List

        Source URL: www.cs.bham.ac.uk

        Language: English - Date: 2009-02-25 10:33:24
          946

          Countermeasures in Modern Operating Systems Yves Younan, Vulnerability Research Team (VRT) Introduction  Programs in C/C++: memory error vulnerabilities

          Add to Reading List

          Source URL: www.countermeasure2013.com

          Language: English - Date: 2013-11-13 09:56:29
            947

            Model-Based Vulnerability Testing for Web Applications F. Lebeau, B. Legeard, F. Peureux, A. VERNOTTE FEMTO-ST Institute / University of Franche-Comt´e UMR CNRS 6174, 25030 Besancon, France. Smartesting R&D Center, 2500

            Add to Reading List

            Source URL: www.spacios.eu

            Language: English - Date: 2013-04-08 17:50:52
              948

              Coordinated Entry System (CES) in SPA 2 CES is an approach to match homeless individuals to housing support and resources based on vulnerability. ASSESS  ASSIST  ASSIGN! These are the pillars of CES. ASSESS: survey

              Add to Reading List

              Source URL: ceslosangeles.weebly.com

              Language: English - Date: 2014-08-26 14:46:34
                949

                SNMP Vulnerability Management SNMP Vulnerability Management Solutions SNMP Vulnerabilities Simple Network Management Protocol (SNMP) is commonly used to monitor and manage critical

                Add to Reading List

                Source URL: bclpower.co.uk

                Language: English - Date: 2015-03-06 12:22:59
                  950

                  A vulnerability in Google AdSense: Automatic extraction of links to ads . Prof. Ph. D. Manuel Blázquez Universidad Complutense de Madrid

                  Add to Reading List

                  Source URL: arxiv.org

                  Language: English - Date: 2015-09-27 20:11:20
                    UPDATE