Bug

Results: 5022



#Item
1Logic / Mathematical logic / Non-classical logic / Markov logic network / Software testing / Probabilistic logic / Software bug / Code coverage / Debugging / Inference / First-order logic / Buggy

Software Bug Localization with Markov Logic Sai Zhang Congle Zhang Department of Computer Science & Engineering

Add to Reading List

Source URL: zhang-sai.github.io

Language: English - Date: 2015-05-05 00:58:34
2Software engineering / Software / Code coverage / Software testing / ARG2 / Xdebug / Relational operator / Tarantula / Computer programming

Software Bug Localization with Markov Logic Sai Zhang, Congle Zhang University of Washington Presented by Todd Schiller

Add to Reading List

Source URL: zhang-sai.github.io

Language: English - Date: 2015-05-05 00:58:35
3Security engineering / Cyberwarfare / Computer network security / Cybercrime / Computer security / Cryptography / Secure communication / HKN / Security

Invest in future. Invest in your side of the firewall We provide individualized service based on peculiarities of your code and cybersecurity perimeter and offer wide customization options for each bug bounty program tha

Add to Reading List

Source URL: hacken.io

Language: English - Date: 2017-10-12 11:58:38
4Security engineering / Cyberwarfare / Computer network security / Cybercrime / Computer security / Cryptography / Secure communication / HKN / Security

Invest in future. Invest in your side of the firewall We provide individualized service based on peculiarities of your code and cybersecurity perimeter and offer wide customization options for each bug bounty program tha

Add to Reading List

Source URL: hacken.io

Language: English - Date: 2017-10-12 11:58:32
5Cryptocurrencies / Ethereum / Blockchains / Computing / Alternative currencies / Concurrent computing / Distributed computing / Cross-platform software / Bug bounty program / Smart contract / Software bug / Bounty

Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts Lorenz Breidenbach, Cornell Tech, IC3, ETH Zurich; Philip Daian, Cornell Tech, IC3; Florian Tramer, Stanford; Ari Juels, Cornell Tech

Add to Reading List

Source URL: www.usenix.org

Language: English
6Security engineering / Cyberwarfare / Computer network security / Cybercrime / Computer security / Cryptography / Secure communication / HKN / Security

Invest in future. Invest in your side of the firewall We provide individualized service based on peculiarities of your code and cybersecurity perimeter and offer wide customization options for each bug bounty program tha

Add to Reading List

Source URL: hacken.io

Language: English - Date: 2017-10-05 12:05:10
7

PDF Document

Add to Reading List

Source URL: www.hug-a-bug.com

- Date: 2009-02-26 22:56:38
    8

    PDF Document

    Add to Reading List

    Source URL: www.hug-a-bug.com

    - Date: 2009-02-26 22:56:58
      9

      PDF Document

      Add to Reading List

      Source URL: www.hug-a-bug.com

      - Date: 2009-02-26 22:59:40
        10

        MO-ITA-BUG-base10-17

        Add to Reading List

        Source URL: www.ormesa.com

        Language: Italian - Date: 2017-11-17 02:34:55
          UPDATE