21![Perimeter-Crossing Buses: a New Attack Surface for Embedded Systems Sergey Bratus Travis Goodspeed Perimeter-Crossing Buses: a New Attack Surface for Embedded Systems Sergey Bratus Travis Goodspeed](https://www.pdfsearch.io/img/76b5d39b0d045f3cee179bd2726829f4.jpg) | Add to Reading ListSource URL: www.cs.dartmouth.eduLanguage: English - Date: 2013-09-11 09:06:34
|
---|
22![2012 45th Hawaii International Conference on System Sciences Api-do: Tools for Exploring the Wireless Attack Surface in Smart Meters Travis Goodspeed University of Pennsylvania 2012 45th Hawaii International Conference on System Sciences Api-do: Tools for Exploring the Wireless Attack Surface in Smart Meters Travis Goodspeed University of Pennsylvania](https://www.pdfsearch.io/img/b2df1ba23bb980de75911d52c0e984af.jpg) | Add to Reading ListSource URL: www.cs.dartmouth.eduLanguage: English - Date: 2012-06-21 17:59:04
|
---|
23![BOSS POLYMER TECHNOLOGIES PTY LTD INDICATIVE CHEMICAL RESISTANCE OF PVC LEGEND R - Recommended - No effect / attack M - Minor or Moderate Effect - Slight attack, may cause swelling or surface deterioration, but with no l BOSS POLYMER TECHNOLOGIES PTY LTD INDICATIVE CHEMICAL RESISTANCE OF PVC LEGEND R - Recommended - No effect / attack M - Minor or Moderate Effect - Slight attack, may cause swelling or surface deterioration, but with no l](https://www.pdfsearch.io/img/a8069eb15b4e38f26529ba1c87793e65.jpg) | Add to Reading ListSource URL: www.bosspolymer.com.auLanguage: English - Date: 2013-04-15 21:52:47
|
---|
24![Windows Server / Windows Vista / Attack Surface Analyzer / Computer security / Access control list / Windows Registry / Mandatory Integrity Control / Filesystem permissions / Architecture of Windows NT / Microsoft Windows / Computing / System software Windows Server / Windows Vista / Attack Surface Analyzer / Computer security / Access control list / Windows Registry / Mandatory Integrity Control / Filesystem permissions / Architecture of Windows NT / Microsoft Windows / Computing / System software](/pdf-icon.png) | Add to Reading ListSource URL: download.microsoft.comLanguage: English - Date: 2012-08-01 20:48:11
|
---|
25![Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing Jared D. DeMott Computer Science Michigan State University Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing Jared D. DeMott Computer Science Michigan State University](https://www.pdfsearch.io/img/e38b01bccb036e09780b48ee21af6d49.jpg) | Add to Reading ListSource URL: www.blackhat.comLanguage: English - Date: 2014-12-16 19:06:37
|
---|
26![Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing Jared DeMott Dr. Richard Enbody @msu.edu Dr. William Punch Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing Jared DeMott Dr. Richard Enbody @msu.edu Dr. William Punch](https://www.pdfsearch.io/img/0146a648fa1acebcaabf92c307a8e51f.jpg) | Add to Reading ListSource URL: www.blackhat.comLanguage: English - Date: 2014-12-16 19:06:37
|
---|
27![English PoINT File System Analyzer & Determine the Amount of Inactive Data English PoINT File System Analyzer & Determine the Amount of Inactive Data](https://www.pdfsearch.io/img/4dbb6c6a2f9f5adf951a6e33145ff04b.jpg) | Add to Reading ListSource URL: www.wpoint.co.ukLanguage: English - Date: 2014-08-27 04:11:49
|
---|
28![Evaluation of Risk for Complex Systems Using Attack Surface Leanid Krautsevich, Fabio Martinelli and Artsiom Yautsiukhin The Institute of Informatics and Telematics of The National Research Council Via G. Moruzzi 1, Pisa Evaluation of Risk for Complex Systems Using Attack Surface Leanid Krautsevich, Fabio Martinelli and Artsiom Yautsiukhin The Institute of Informatics and Telematics of The National Research Council Via G. Moruzzi 1, Pisa](https://www.pdfsearch.io/img/a67e0e2293fa31c0d851ad495aff7bf8.jpg) | Add to Reading ListSource URL: wwwold.iit.cnr.itLanguage: English - Date: 2015-04-02 07:11:50
|
---|
29![Life in the Digital Crosshairs The dawn of the Microsoft Security Development Lifecycle
The dawn of Microsoft Trustworthy Computing Life in the Digital Crosshairs The dawn of the Microsoft Security Development Lifecycle
The dawn of Microsoft Trustworthy Computing](https://www.pdfsearch.io/img/47c6e89696e619bc0a40ee55ac9b2b54.jpg) | Add to Reading ListSource URL: download.microsoft.comLanguage: English - Date: 2014-05-20 17:31:10
|
---|
30![Deep Security 9.5 SP1 Supported Features by Platform Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the sof
Deep Security 9.5 SP1 Supported Features by Platform Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the sof](https://www.pdfsearch.io/img/8216dd7e909545799597ac4409a1e505.jpg) | Add to Reading ListSource URL: docs.trendmicro.comLanguage: English - Date: 2015-04-08 14:04:56
|
---|