Exploit

Results: 786



#Item
21IBM MAKING A COMMITMENT TO NEXT PHASE OF THE INTERNET FEATURES AND COMMENTARYSteve Lohr reported: IBM is announcing a new initiative to support and exploit a technology

IBM MAKING A COMMITMENT TO NEXT PHASE OF THE INTERNET FEATURES AND COMMENTARYSteve Lohr reported: IBM is announcing a new initiative to support and exploit a technology

Add to Reading List

Source URL: marianne.in2p3.fr

Language: English - Date: 2003-01-13 05:57:26
    22Strangers on a Plane: Context-Dependent Willingness to Divulge Sensitive Information LESLIE K. JOHN ALESSANDRO ACQUISTI GEORGE LOEWENSTEIN New marketing paradigms that exploit the capabilities for data collection, aggreg

    Strangers on a Plane: Context-Dependent Willingness to Divulge Sensitive Information LESLIE K. JOHN ALESSANDRO ACQUISTI GEORGE LOEWENSTEIN New marketing paradigms that exploit the capabilities for data collection, aggreg

    Add to Reading List

    Source URL: www.cmu.edu

    Language: English - Date: 2018-07-02 12:23:27
      23hStorage-DB: Heterogeneity-aware Data Management to Exploit the Full Capability of Hybrid Storage Systems Tian Luo1 Rubao Lee1

      hStorage-DB: Heterogeneity-aware Data Management to Exploit the Full Capability of Hybrid Storage Systems Tian Luo1 Rubao Lee1

      Add to Reading List

      Source URL: www.csc.lsu.edu

      - Date: 2013-07-24 01:58:07
        24“A Stalker’s Paradise”: How Intimate Partner Abusers Exploit Technology Diana Freed† Jackeline Palmer‡ Diana MinchalaΨ Karen LevyΦ Thomas Ristenpart† Nicola Dell† †  Cornell Tech

        “A Stalker’s Paradise”: How Intimate Partner Abusers Exploit Technology Diana Freed† Jackeline Palmer‡ Diana MinchalaΨ Karen LevyΦ Thomas Ristenpart† Nicola Dell† † Cornell Tech

        Add to Reading List

        Source URL: www.nixdell.com

        - Date: 2018-01-13 08:21:00
          25DULO: An Effective Buffer Cache Management Scheme to Exploit Both Temporal and Spatial Locality Song Jiang Performance & Architecture Laboratory Computer & Computational Sciences Div. Los Alamos National Laboratory

          DULO: An Effective Buffer Cache Management Scheme to Exploit Both Temporal and Spatial Locality Song Jiang Performance & Architecture Laboratory Computer & Computational Sciences Div. Los Alamos National Laboratory

          Add to Reading List

          Source URL: www.csc.lsu.edu

          - Date: 2013-07-24 01:58:00
            26MRG Effitas – Real World Enterprise Security Exploit Prevention – MarchReal World Enterprise Security Exploit Prevention Test March 2015

            MRG Effitas – Real World Enterprise Security Exploit Prevention – MarchReal World Enterprise Security Exploit Prevention Test March 2015

            Add to Reading List

            Source URL: www.mrg-effitas.com

            - Date: 2016-02-29 11:09:18
              27A Special Inquiry Regarding the Accuracy of FBI Statements Concerning its Capabilities to Exploit an iPhone Seized During the San Bernardino Terror Attack Investigation

              A Special Inquiry Regarding the Accuracy of FBI Statements Concerning its Capabilities to Exploit an iPhone Seized During the San Bernardino Terror Attack Investigation

              Add to Reading List

              Source URL: oig.justice.gov

              - Date: 2018-03-27 10:40:29
                28Understanding the fundamentals of attacks What is happening when someone writes an exploit? Halvar Flake / Thomas Dullien November 3, 2016 The /home owners association

                Understanding the fundamentals of attacks What is happening when someone writes an exploit? Halvar Flake / Thomas Dullien November 3, 2016 The /home owners association

                Add to Reading List

                Source URL: itsec.cs.uni-bonn.de

                - Date: 2017-08-16 04:32:12
                  29Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts∗ Lorenz Breidenbach Philip Daian

                  Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts∗ Lorenz Breidenbach Philip Daian

                  Add to Reading List

                  Source URL: thehydra.io

                  - Date: 2018-02-12 16:14:09
                    30Digital Market Manipulation Ryan Calo* ABSTRACT In 1999, Jon Hanson and Douglas Kysar coined the term “market manipulation” to describe how companies exploit the cognitive limitations of consumers. For example, every

                    Digital Market Manipulation Ryan Calo* ABSTRACT In 1999, Jon Hanson and Douglas Kysar coined the term “market manipulation” to describe how companies exploit the cognitive limitations of consumers. For example, every

                    Add to Reading List

                    Source URL: www.gwlr.org

                    - Date: 2017-05-19 23:23:53