skip to main content
Resultados 1 2 3 4 5 next page
Mostrar Somente
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Analysis of Cryptographic CVEs: Lessons Learned and Perspectives
Material Type:
Capítulo de Livro
Adicionar ao Meu Espaço

Analysis of Cryptographic CVEs: Lessons Learned and Perspectives

Khoury, Raphaël ; Bolduc, Jérémy ; Lafrenière-Nickopoulos, Jason ; Odedele, Abdel-Gany

Foundations and Practice of Security, p.208-218 [Periódico revisado por pares]

Cham: Springer Nature Switzerland

Sem texto completo

2
Follow the Blue Bird: A Study on Threat Data Published on Twitter
Material Type:
Capítulo de Livro
Adicionar ao Meu Espaço

Follow the Blue Bird: A Study on Threat Data Published on Twitter

Alves, Fernando ; Andongabo, Ambrose ; Gashi, Ilir ; Ferreira, Pedro M. ; Bessani, Alysson

Computer Security – ESORICS 2020, p.217-236 [Periódico revisado por pares]

Cham: Springer International Publishing

Sem texto completo

3
Vulnerability of Deep Reinforcement Learning to Policy Induction Attacks
Material Type:
Capítulo de Livro
Adicionar ao Meu Espaço

Vulnerability of Deep Reinforcement Learning to Policy Induction Attacks

Perner, Petra

Machine Learning and Data Mining in Pattern Recognition, 2017, Vol.10358, p.262-275 [Periódico revisado por pares]

Switzerland: Springer International Publishing AG

Sem texto completo

4
Interdependence and Vulnerability in Systems: A Review of Theory for Autonomous Human-Machine Teams
Material Type:
Capítulo de Livro
Adicionar ao Meu Espaço

Interdependence and Vulnerability in Systems: A Review of Theory for Autonomous Human-Machine Teams

Lawless, William F ; Llinas, James ; Sofge, Donald A ; Mittu, Ranjeev

Engineering Artificially Intelligent Systems, 2021, Vol.13000, p.247-259 [Periódico revisado por pares]

Switzerland: Springer International Publishing AG

Sem texto completo

5
An Empirical Study on Using the National Vulnerability Database to Predict Software Vulnerabilities
Material Type:
Capítulo de Livro
Adicionar ao Meu Espaço

An Empirical Study on Using the National Vulnerability Database to Predict Software Vulnerabilities

Zhang, Su ; Caragea, Doina ; Ou, Xinming

Database and Expert Systems Applications, p.217-231 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Sem texto completo

6
Chapter 2 Application of the Multigrammatical Framework to the Assessment of Resilience and Recoverability of Large – Scale Industrial Systems
Material Type:
Capítulo de Livro
Adicionar ao Meu Espaço

Chapter 2 Application of the Multigrammatical Framework to the Assessment of Resilience and Recoverability of Large – Scale Industrial Systems

Sheremet, Igor A.

Resilience in the Digital Age, p.16-34 [Periódico revisado por pares]

Cham: Springer International Publishing

Sem texto completo

7
Vulnerability Report Analysis and Vulnerability Reproduction for Web Applications
Material Type:
Capítulo de Livro
Adicionar ao Meu Espaço

Vulnerability Report Analysis and Vulnerability Reproduction for Web Applications

Hermanns, Holger ; Sun, Jun ; Bu, Lei

Dependable Software Engineering. Theories, Tools, and Applications, 2023, Vol.14464, p.279-297 [Periódico revisado por pares]

Singapore: Springer

Sem texto completo

8
Vulnerability Variants and Matching in Networks
Material Type:
Capítulo de Livro
Adicionar ao Meu Espaço

Vulnerability Variants and Matching in Networks

Chen, Xiaofeng ; Yan, Hongyang ; Yan, Qiben ; Zhang, Xiangliang

Machine Learning for Cyber Security, 2020, Vol.12486, p.511-518 [Periódico revisado por pares]

Switzerland: Springer International Publishing AG

Sem texto completo

9
Why Johnny Can’t Pentest: An Analysis of Black-Box Web Vulnerability Scanners
Material Type:
Capítulo de Livro
Adicionar ao Meu Espaço

Why Johnny Can’t Pentest: An Analysis of Black-Box Web Vulnerability Scanners

Doupé, Adam ; Cova, Marco ; Vigna, Giovanni

Detection of Intrusions and Malware, and Vulnerability Assessment, p.111-131 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Sem texto completo

10
BitBlaze: A New Approach to Computer Security via Binary Analysis
Material Type:
Capítulo de Livro
Adicionar ao Meu Espaço

BitBlaze: A New Approach to Computer Security via Binary Analysis

Song, Dawn ; Brumley, David ; Yin, Heng ; Caballero, Juan ; Jager, Ivan ; Kang, Min Gyung ; Liang, Zhenkai ; Newsome, James ; Poosankam, Pongsin ; Saxena, Prateek

Information Systems Security, p.1-25 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Sem texto completo

Resultados 1 2 3 4 5 next page

Personalize Seus Resultados

  1. Editar

Refine Search Results

Expandir Meus Resultados

  1.   

Mostrar Somente

  1. Recursos Online (76)
  2. Revistas revisadas por pares (219)

Data de Publicação 

De até
  1. Antes de2005  (8)
  2. 2005Até2009  (17)
  3. 2010Até2014  (54)
  4. 2015Até2020  (100)
  5. Após 2020  (53)
  6. Mais opções open sub menu

Buscando em bases de dados remotas. Favor aguardar.