Výsledky vyhledávání - java code vulnerabilties

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Autoři: Debbabi, M. Saleh, M. Talhi, C. a další

    Zdroj: 16th International Workshop on Database & Expert Systems Applications (DEXA'05); 2005, p231-235, 5p

  6. 6
  7. 7
  8. 8
  9. 9

    Zdroj: Research in Attacks, Intrusions & Defenses 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings; 2015, p493-514, 22p

  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    Zdroj: 2012 IEEE Sixth International Conference on Software Security & Reliability; 1/ 1/2012, p78-87, 10p

  15. 15
  16. 16

    Zdroj: Information & Communications Security: 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 - December 2, 2016, Proceedings; 2016, p376-391, 16p

  17. 17
  18. 18
  19. 19

    Zdroj: Information Systems Security: 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings; 2016, p263-282, 20p

  20. 20

    Zdroj: Aroq - Just-Auto; Jul2021, p1-38, 3065p