Results 21 to 30 of about 41,844 (95)

Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data

open access: yes, 2017
Each year, thousands of software vulnerabilities are discovered and reported to the public. Unpatched known vulnerabilities are a significant security risk. It is imperative that software vendors quickly provide patches once vulnerabilities are known and
Edkrantz M.   +4 more
core   +1 more source

Logics of Finite Hankel Rank

open access: yes, 2015
We discuss the Feferman-Vaught Theorem in the setting of abstract model theory for finite structures. We look at sum-like and product-like binary operations on finite structures and their Hankel matrices.
A Durand   +29 more
core   +1 more source

Hacker Combat: A Competitive Sport from Programmatic Dueling & Cyberwarfare

open access: yes, 2017
The history of humanhood has included competitive activities of many different forms. Sports have offered many benefits beyond that of entertainment. At the time of this article, there exists not a competitive ecosystem for cyber security beyond that of ...
Pharr, Jovonni L.
core  

Innovative Method of the Power Analysis [PDF]

open access: yes, 2013
This paper describes an innovative method of the power analysis which presents the typical example of successful attacks against trusted cryptographic devices such as RFID (Radio-Frequency IDentifications) and contact smart cards.
Martinasek, Z., Zeman, V.
core   +1 more source

FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs

open access: yes, 2006
FLAIM (Framework for Log Anonymization and Information Management) addresses two important needs not well addressed by current log anonymizers. First, it is extremely modular and not tied to the specific log being anonymized.
Lakkaraju, Kiran   +2 more
core   +1 more source

Quantifying medical device cybersecurity risk with CVSS BTE. [PDF]

open access: yesSci Rep
Bracciale L   +5 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy