Results 21 to 30 of about 41,844 (95)
Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data
Each year, thousands of software vulnerabilities are discovered and reported to the public. Unpatched known vulnerabilities are a significant security risk. It is imperative that software vendors quickly provide patches once vulnerabilities are known and
Edkrantz M. +4 more
core +1 more source
We discuss the Feferman-Vaught Theorem in the setting of abstract model theory for finite structures. We look at sum-like and product-like binary operations on finite structures and their Hankel matrices.
A Durand +29 more
core +1 more source
Hacker Combat: A Competitive Sport from Programmatic Dueling & Cyberwarfare
The history of humanhood has included competitive activities of many different forms. Sports have offered many benefits beyond that of entertainment. At the time of this article, there exists not a competitive ecosystem for cyber security beyond that of ...
Pharr, Jovonni L.
core
Innovative Method of the Power Analysis [PDF]
This paper describes an innovative method of the power analysis which presents the typical example of successful attacks against trusted cryptographic devices such as RFID (Radio-Frequency IDentifications) and contact smart cards.
Martinasek, Z., Zeman, V.
core +1 more source
FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs
FLAIM (Framework for Log Anonymization and Information Management) addresses two important needs not well addressed by current log anonymizers. First, it is extremely modular and not tied to the specific log being anonymized.
Lakkaraju, Kiran +2 more
core +1 more source
Quantifying medical device cybersecurity risk with CVSS BTE. [PDF]
Bracciale L +5 more
europepmc +1 more source
Can Mimosa pudica Plants Enumerate Light Exposure Events? [PDF]
Vishton PM, Bartosh PJ.
europepmc +1 more source
IQ, an Uninvited Guest in the Field of Learning?: Correlation Study of Comprehensive Learning Test. [PDF]
Cha MC +4 more
europepmc +1 more source
Threats and vulnerabilities in artificial intelligence and agentic AI models. [PDF]
Radanliev P, Santos O, Maple C.
europepmc +1 more source
Thermal effects on feeding efficiency and body condition in invasive and native benthivorous freshwater fishes. [PDF]
Benjamin C, Hill J, Ricciardi A.
europepmc +1 more source

