Exploit

Results: 786



#Item
31

:63601 anomalous (IIS exploit:12431 normal

Add to Reading List

Source URL: depositonce.tu-berlin.de

- Date: 2015-11-23 12:35:04
    32

    Adapting applications to exploit virtualization management knowledge Vitalian A. Danciu Alexander Knapp

    Add to Reading List

    Source URL: cnsm-conf.org

    - Date: 2013-10-11 08:37:00
      33

      Chapter 6: Did the RNA World Exploit an Expanded Genetic Alphabet? (PDF)

      Add to Reading List

      Source URL: rna.cshl.edu

      - Date: 2008-06-25 17:18:08
        34

        Learning Affordances of Video-Print combinations Table 1, lists techniques and teaching functions that exploit the distinctive presentational attributes of TV. Table 1. Affordances of video – techniques and teaching fu

        Add to Reading List

        Source URL: www.jackkoumi.co.uk

        - Date: 2014-11-25 15:51:16
          35

          EVOLUTION OF EXPLOIT KITS Exploring Past Trends and Current Improvements Joseph C. Chen

          Add to Reading List

          Source URL: www.trendmicro.com

          - Date: 2015-03-25 09:10:07
            36

            Use Hierarchical Storage and Analysis to Exploit Intrinsic Parallelism Charlie Zender1 <> Pedro Vicente1, Wenshan Wang1 1

            Add to Reading List

            Source URL: dust.ess.uci.edu

            - Date: 2013-12-17 20:04:38
              37

              Practical Exploitation of Modern Wireless Devices Thorsten Schroeder

              Add to Reading List

              Source URL: www.remote-exploit.org

              - Date: 2012-02-21 13:53:59
                38

                Exploit Implicit and Explicit Parallelism for Faster Geoscience Workflows Charlie Zender <> 1 Departments of Earth System Science and

                Add to Reading List

                Source URL: dust.ess.uci.edu

                - Date: 2014-03-27 10:22:51
                  39

                  “Http Parameter Contamination” Research paper Ivan Markovic <> Network Security Solutions, Serbia 2011 http://netsec.rs/

                  Add to Reading List

                  Source URL: www.exploit-db.com

                  - Date: 2011-07-15 16:32:26
                    40

                    Hyperion: Implementation of a PE-Crypter Christian Ammann May 8, 2012 Nullsecurity Team

                    Add to Reading List

                    Source URL: www.exploit-db.com

                    - Date: 2012-05-13 05:49:21
                      UPDATE