264
Voted
CODASPY
10 years 1 months ago
2016 132
Voted
CODASPY
10 years 1 months ago
2016
In international military coalitions, situation awareness is achieved by gathering critical intel from different authorities. Authorities want to retain control over their data, a...
117
Voted
CODASPY
10 years 1 months ago
2016
With sustained growth of software complexity, finding security vulnerabilities in operating systems has become an important necessity. Nowadays, OS are shipped with thousands of ...
144
Voted
CODASPY
10 years 1 months ago
2016
Honeynet is a collection of honeypots that are set up to attract as many attackers as possible to learn about their patterns, tactics, and behaviors. However, existing honeypots s...
136
Voted
CODASPY
10 years 1 months ago
2016
Many mobile services consist of two components: a server providing an API, and an application running on smartphones and communicating with the API. An unresolved problem in this ...
|