[go: up one dir, main page]

Feldman et al., 2018 - Google Patents

David Rowe

Feldman et al., 2018

View PDF
Document ID
7566641865941244680
Author
Feldman T
Allodi L
Li F
Paxson V
Pathak T
Publication year

External Links

Snippet

Columns &Hybrid SMR and a New API &Infiltrating an Exploit Market &Vulnerabilities and Patching Open Source &Fin Page 1 ;login: SPRING 2018 VOL. 43, NO. 1 Columns gRPC and Protocol Buffers Chris “Mac” McEniry Finding Hot Perl Modules David N. Blank-Edelman The Open …
Continue reading at www.usenix.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
US20230254330A1 (en) Distinguishing user-initiated activity from application-initiated activity
US20240106846A1 (en) Approval Workflows For Anomalous User Behavior
Alrawi et al. The betrayal at cloud city: An empirical analysis of {Cloud-Based} mobile backends
RU2697950C2 (en) System and method of detecting latent behaviour of browser extension
US20240163261A1 (en) Dynamic authentication attack detection and enforcement at network, application, and host level
Serketzis et al. Actionable threat intelligence for digital forensics readiness
Aldribi et al. Data sources and datasets for cloud intrusion detection modeling and evaluation
US20250039196A1 (en) System and method for track and trace user and entity behavior analysis
US20240291869A1 (en) Self-adjusting cybersecurity analysis with network mapping
Eichner et al. Confidential federated computations
Hageman et al. Mixed signals: Analyzing software attribution challenges in the android ecosystem
Sabillon Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM
Chebbi Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
Wu et al. Quantitative analysis of the security of software‐defined network controller using threat/effort model
Feldman et al. David Rowe
Periasamy et al. AssessJet-Penetration testing and Vulnerability Assessment for Websites
Bock Measuring adoption of phishing-resistant authentication methods on the web
Hastings Combating Source Poisoning and Next-Generation Software Supply Chain Attacks Using Education, Tools, and Techniques
de Jesus Silva Zero Trust Security for Microservices in Scalable Systems
Camp et al. Failures of dynamic control systems
de Sousa XS-Leaks Crutch: Assisted Detection & Exploitation of Cross-Site Leaks
Piombino Intelligent forensics for the automatic anomaly detection in distributed infrastructures
Pradeep Understanding and Improving Data Security and Privacy of Mobile Applications
Silva Zero Trust Security for microservices in scalable systems
Năstase et al. Cowrie SSH Honeypot: Architecture, Improvements and Data Visualization