×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [threat models]
Home >
threat models
Beyond security testing
95 views
Ejyle company profile
69 views
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partners Meeting Sep2011
107 views
Ngn sec
342 views
Secure routing in Wireless sensor Networks: Attacks and Countermeasures AUTHORS: CHRIS KARLOF AND DAVID WAGNER UNIVERSITY OF CALIFORNIA AT BERKELEY, BERKELEY,
215 views
Automated Black-Box Detection of Side Channel Vulnerabilities in Web Applications Peter Chapman David Evans University of Virginia
215 views
MOBILE DATA CHARGING: ACM CCS12 NEW ATTACKS AND COUNTERMEASURES Chunyi Peng, Chi-Yu Li, Guan-Hua Tu, Songwu Lu, Lixia Zhang University of California, Los.
215 views
White Paper: How to conduct a code review effective techniques for uncovering vulnerabilities in your code
7.124 views
Six key security engineering activities
655 views
Download It
172 views
Os linux complete notes
210 views
Secure routing in wsn-attacks and countermeasures
88 views
Next >