Vulnerability database

Results: 242



#Item
1Journal of Communications Vol. 10, No. 2, FebruaryASVC: An Automatic Security Vulnerability Categorization Framework Based on Novel Features of Vulnerability Data Tao Wen1, Yuqing Zhang1,2, Qianru Wu2, and Gang Ya

Journal of Communications Vol. 10, No. 2, FebruaryASVC: An Automatic Security Vulnerability Categorization Framework Based on Novel Features of Vulnerability Data Tao Wen1, Yuqing Zhang1,2, Qianru Wu2, and Gang Ya

Add to Reading List

Source URL: www.jocm.us

Language: English - Date: 2015-03-08 23:14:44
2Architectural Analysis for Security (AAFS)

Architectural Analysis for Security (AAFS)

Add to Reading List

Source URL: resources.sei.cmu.edu

Language: English - Date: 2015-05-01 17:51:11
3

PDF Document

Add to Reading List

Source URL: examples.complianceforge.com

Language: English - Date: 2016-07-28 21:18:18
4

PDF Document

Add to Reading List

Source URL: examples.complianceforge.com

Language: English - Date: 2016-07-28 21:18:05
5NIST SPRevision 3, The Technical Specification for SCAP Version 1.3

NIST SPRevision 3, The Technical Specification for SCAP Version 1.3

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-18 13:14:41
62016 Data Breach Investigations Report—Executive SummaryData Breach Investigations Report

2016 Data Breach Investigations Report—Executive SummaryData Breach Investigations Report

Add to Reading List

Source URL: www.verizonenterprise.com

Language: English - Date: 2016-06-13 20:00:00
7Database Assessment Vulnerability Assessment Course All materials are licensed under a Creative Commons Share Alike license. ■ http://creativecommons.org/licenses/by-sa/3.0/

Database Assessment Vulnerability Assessment Course All materials are licensed under a Creative Commons Share Alike license. ■ http://creativecommons.org/licenses/by-sa/3.0/

Add to Reading List

Source URL: www.opensecuritytraining.info

Language: English - Date: 2013-11-03 14:54:09
    8Security Vulnerability Notice SEORACLE-14 [Security vulnerabilities in Java SE, Issue 69#2] DISCLAIMER INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED

    Security Vulnerability Notice SEORACLE-14 [Security vulnerabilities in Java SE, Issue 69#2] DISCLAIMER INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED "AS IS" WITHOUT

    Add to Reading List

    Source URL: www.security-explorations.com

    Language: English - Date: 2016-03-10 01:27:46
    9Memory Corruption Attacks The (almost) Complete History thinkst applied research haroon meer

    Memory Corruption Attacks The (almost) Complete History thinkst applied research haroon meer

    Add to Reading List

    Source URL: media.blackhat.com

    Language: English - Date: 2012-04-07 14:53:12
    10Published by S&S Media Group  October 2012 Issue 7  Also in this issue

    Published by S&S Media Group October 2012 Issue 7 Also in this issue

    Add to Reading List

    Source URL: entwickler.de

    Language: English - Date: 2015-01-21 09:26:18