Zero-day

Results: 689



#Item
171Cyberwarfare / Computer security / Computing / Malware / Computer network security / Computer viruses / Hacking / Zero-day / Botnet / Antivirus software / Vulnerability

THE MITRE CORPORATION THE MAEC™ LANGUAGE OVERVIEW DESIREE BECK, IVAN KIRILLOV, PENNY CHASE, MITRE JUNE 12, 2014

Add to Reading List

Source URL: maecproject.github.io

Language: English - Date: 2016-06-15 18:10:07
172Computing / Cyberwarfare / Computer network security / Computer security / Cybercrime / Spamming / Internet security / Zero-day / Phishing / Computer virus / Syslog / Client honeypot

Appliance X1 xorlab AG c/o ETH Zürich Universitätsstrasse 6

Add to Reading List

Source URL: www.xorlab.com

Language: English - Date: 2016-03-11 01:09:00
173

THEOREM OF THE DAY Sendov’s Conjecture (a Theorem Under Construction!) Let f (z) be a polynomial of degree n ≥ 2, all of whose zeros lie in the closed unit disk. Then for any zero z0 of f (z), the closed unit disk wi

Add to Reading List

Source URL: theoremoftheday.org

Language: English - Date: 2015-01-19 07:52:10
    174Cyberwarfare / Computer security / Computing / Computer network security / Hacking / Software testing / Vulnerability / CERT Coordination Center / SQL injection / Cross-site scripting / CVSS / Zero-day

    Reporting Status of Vulnerability-related Information about Software Products and Websites - 2nd Quarter ofApril – June) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency Respon

    Add to Reading List

    Source URL: www.ipa.go.jp

    Language: English - Date: 2016-03-17 21:00:12
    175Computer security / Cyberwarfare / Computing / Computer network security / Software testing / Internet security / Cyber-Insurance / Vulnerability / CERT Coordination Center / Zero-day / Bug bounty program / Attack

    A Comparison of Market Approaches to Software Vulnerability Disclosure Rainer B¨ ohme Technische Universit¨ at Dresden

    Add to Reading List

    Source URL: www.is.uni-muenster.de

    Language: English - Date: 2012-12-21 05:49:44
    176

    THEOREM OF THE DAY The Lutz-Nagell Theorem For the elliptic curve y2 = x3 + ax2 + bx + c, with a, b, and c integers and having (non-zero) discriminant function D = −4a3c + a2b2 + 18abc − 4b3 − 27c2, let P = (X, Y)

    Add to Reading List

    Source URL: www.theoremoftheday.org

    Language: English - Date: 2014-02-07 05:07:17
      177Computer network security / SentinelOne / Zero-day / Antivirus software / Malware / Palo Alto Networks / Computer security / Computer virus / Carbon Black / ForeScout Technologies

      SC AWARDSExcellence Award Excellence Award

      Add to Reading List

      Source URL: go.cyphort.com

      Language: English - Date: 2016-03-26 18:26:47
      178

      THEOREM OF THE DAY The Robbins Problem Every Robbins algebra is a Boolean algebra. A Boolean algebra is a set containing at least two elements, 0 (zero) and 1 (one); closed under three operations, +, × and ′ (compleme

      Add to Reading List

      Source URL: www.theoremoftheday.org

      Language: English - Date: 2015-06-09 06:44:04
        179Software / Computing / Cyberwarfare / Computer network security / Computer security / Warez / Zero-day / Vulnerability database / Vulnerability / Common Vulnerabilities and Exposures / NetBSD / Solaris

        OS Diversity for Intrusion Tolerance: Myth or Reality? Miguel Garcia∗ , Alysson Bessani∗ , Ilir Gashi† , Nuno Neves∗ and Rafael Obelheiro‡ ∗ LaSIGE, University of Lisbon, Faculty of Sciences – Lisbon, Portu

        Add to Reading List

        Source URL: www.di.fc.ul.pt

        Language: English - Date: 2011-04-15 13:02:34
        180Computer security / Computer network security / Vulnerability / Software testing / Vulnerability database / National Vulnerability Database / Zero-day / CVSS / Common Vulnerabilities and Exposures / Attack / Buffer overflow / Social vulnerability

        SOFTWARE – PRACTICE AND EXPERIENCE Softw. Pract. ExperPublished online in Wiley Online Library (wileyonlinelibrary.com). DOI: spe.2180 Analysis of operating system diversity for intrusion tolerance Mig

        Add to Reading List

        Source URL: www.di.fc.ul.pt

        Language: English - Date: 2013-01-18 09:24:08
        UPDATE