Материалов:
1 005 012

Репозиториев:
30

Авторов:
761 409

По вашему запросу найдено документов: 3850

Страница 1 из 385

Methods for improving Fuzzing-Testing Using Machine Learning and visualisation of results program's binary code. The analysis of the literature allows us to assert that, today, automated fuzzing

Techniques for analyzing of information system vulnerabilitiesTechniques for analyzing the vulnerabilities of information systems based on the use of the Open

Web-applications vulnerabilities testing techniqueThe technique for detecting vulnerabilities in web applications is developed. The technique

Technique of information systems vulnerabilities management of vulnerabilities searching and analyzing in information systems. This technique is based on the use of the Open

THE SIEU RIVER VULNERABILITY ASSESSMENTThis paper examines the role of assessment vulnerability of water resources in order to detect

Range of resistance of hydrobionts to medium contamination with manufactured nanoparticlesAn assessment was performed to estimate ecological and biological effects of metallic and binary

Devolopment of the vulnerability management program in bankingDevolopment of the vulnerability management program in banking

Software solution for vulnerability detectionSoftware solution for vulnerability detection

The problem of password vulnerability in our timeThe problem of password vulnerability in our time

Social risk and vulnerability assessment of hazardous hydrological phenomena in the Krasnodar region of RussiaSocial risk and vulnerability assessment of hazardous hydrological phenomena in the Krasnodar

Страница 1 из 385