Common Vulnerabilities and Exposures

Results: 109



#Item
11Computer access control / Cyberwarfare / Hacking Team / Spyware / Surveillance / Internet Explorer / Adobe Flash Player / POODLE / Common Vulnerabilities and Exposures

ESET_Logo_HorizontalClaim-White

Add to Reading List

Source URL: www.welivesecurity.com

Language: English - Date: 2016-01-22 06:05:11
12Cyberwarfare / Computer security / Cybercrime / National security / Knowledge representation / Cyber-security regulation / Ontology / Upper ontology / Common Vulnerabilities and Exposures / Mitre Corporation / National Cyber Security Division / Michigan Cyber Range

doicomjnl/bxu101

Add to Reading List

Source URL: comjnl.oxfordjournals.org

Language: English
13Cryptography / Computer network security / Computer security / Transport Layer Security / Cryptographic software / Vulnerability / FREAK / OpenSSL / Exploit / Attack / Common Vulnerabilities and Exposures / Shellshock

Vulnerabilities At a glance Description A look into software vulnerabilities, whether we are

Add to Reading List

Source URL: www.kennasecurity.com

Language: English - Date: 2016-04-26 13:43:51
14Cryptography / Cryptographic software / Key management / Internet security / Transport Layer Security / GNU Privacy Guard / OpenSSL / Key server / Key / Public-key cryptography / Heartbleed / Common Vulnerabilities and Exposures

Crypto year in review Sept 2014 Bill Ricker for BLU.org Size matters *Current recommended key sizes.*

Add to Reading List

Source URL: www.blu.org

Language: English - Date: 2014-10-02 16:10:38
15Software maintenance / Software release / Patch / Dynamic software updating / Common Vulnerabilities and Exposures / Binary translation / Linux kernel / Sandbox / Privilege escalation / Windows XP / Android / Shellshock

Hot-Patching a Web Server: a Case Study of ASAP Code Repair Mathias Payer Thomas R. Gross

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
16Software / Computing / Cyberwarfare / Computer network security / Computer security / Warez / Zero-day / Vulnerability database / Vulnerability / Common Vulnerabilities and Exposures / NetBSD / Solaris

OS Diversity for Intrusion Tolerance: Myth or Reality? Miguel Garcia∗ , Alysson Bessani∗ , Ilir Gashi† , Nuno Neves∗ and Rafael Obelheiro‡ ∗ LaSIGE, University of Lisbon, Faculty of Sciences – Lisbon, Portu

Add to Reading List

Source URL: www.di.fc.ul.pt

Language: English - Date: 2011-04-15 13:02:34
17Computer security / Computer network security / Vulnerability / Software testing / Vulnerability database / National Vulnerability Database / Zero-day / CVSS / Common Vulnerabilities and Exposures / Attack / Buffer overflow / Social vulnerability

SOFTWARE – PRACTICE AND EXPERIENCE Softw. Pract. ExperPublished online in Wiley Online Library (wileyonlinelibrary.com). DOI: spe.2180 Analysis of operating system diversity for intrusion tolerance Mig

Add to Reading List

Source URL: www.di.fc.ul.pt

Language: English - Date: 2013-01-18 09:24:08
18Cyberwarfare / Computing / Computer security / Software maintenance / Software release / Patch / Computer network security / Vulnerability / Common Vulnerabilities and Exposures / Transdermal patch / Computer worm / Shavlik Technologies

Timing the Application of Security Patches for Optimal Uptime Steve Beattie, Seth Arnold, Crispin Cowan, Perry Wagle, and Chris Wright † – WireX Communications, Inc. Adam Shostack – Zero Knowledge Systems, Inc. ABS

Add to Reading List

Source URL: adam.shostack.org

Language: English - Date: 2014-06-11 11:42:33
19Massachusetts College of Art and Design / Common Vulnerabilities and Exposures

EVENT TYPE DEFINITIONS AND GUIDELINES MEETING: • •

Add to Reading List

Source URL: inside.massart.edu

Language: English - Date: 2016-03-04 20:59:24
20Computer security / Computing / Security / Security Content Automation Protocol / Mitre Corporation / Computer network security / National security / Software quality / Extensible Configuration Checklist Description Format / Common Vulnerabilities and Exposures / Vulnerability / Open Vulnerability and Assessment Language

Standards in reporting Software Flaws: SCAP, CVE and CWE Robin A. Gandhi, Ph.D. University of Nebraska at Omaha (UNO) College of Information Science and Technology (IS&T) School of Interdisciplinary Informatics (Si2)

Add to Reading List

Source URL: www.nebraskacert.org

Language: English - Date: 2010-05-19 17:57:00
UPDATE