Výsledky vyhledávání - java code vulnerabilties
-
1
Autoři: Mohan Raj U
Témata: Private policing and security services, Cloud computing, java development services, java code vulnerabilties
-
2
Autoři: Zurita Rubin de Celis, Carla
Zdroj: Theses, Dissertations and Culminating Projects
Popis souboru: application/pdf
Relation: https://digitalcommons.montclair.edu/etd/1325; https://digitalcommons.montclair.edu/context/etd/article/2327/viewcontent/ZuritaRubindeCelisCarla_Redacted.pdf
-
3
Autoři: a další
Zdroj: ACM Transactions on Software Engineering & Methodology; Jun2025, Vol. 34 Issue 5, p1-26, 26p
-
4
Autoři: Ramachandran, Sooraj
Zdroj: Lex Localis: Journal of Local Self-Government; 2025 Supplement, Vol. 23 Issue S6, p7780-7788, 9p
-
5
Autoři: a další
Zdroj: 16th International Workshop on Database & Expert Systems Applications (DEXA'05); 2005, p231-235, 5p
-
6
Autoři:
Zdroj: International Journal of Electrical & Computer Engineering (2088-8708); Jun2024, Vol. 14 Issue 3, p2814-2821, 8p
-
7
Autoři: a další
Zdroj: Empirical Software Engineering; Jul2021, Vol. 26 Issue 4, p1-34, 34p
-
8
Autoři: a další
Zdroj: Cameroon Academy of Sciences Journal; Aug2024, Vol. 20 Issue 3, p285-304, 20p
Témata: BASALT, BUILDING evacuation, EFFECT of earthquakes on buildings, BLACK cotton soil, EARTHQUAKES
Geografický termín: CAMEROON
-
9
Autoři:
Zdroj: Research in Attacks, Intrusions & Defenses 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings; 2015, p493-514, 22p
-
10
Autoři:
Zdroj: International Journal of Advanced Research in Computer Science; Mar/Apr2017, Vol. 8 Issue 3, p567-574, 8p
-
11
Autoři:
Zdroj: 2014 47th Hawaii International Conference on System Sciences; 2014, p4878-4886, 9p
-
12
Autoři:
Zdroj: Empirical Software Engineering; Jul2021, Vol. 26 Issue 4, p1-31, 31p
-
13
Autoři:
Zdroj: Empirical Software Engineering; Oct2016, Vol. 21 Issue 5, p1920-1959, 40p
-
14
Autoři: a další
Zdroj: 2012 IEEE Sixth International Conference on Software Security & Reliability; 1/ 1/2012, p78-87, 10p
-
15
GNFCVulFinder: NDEF Vulnerability Discovering for NFC-Enabled Smart Mobile Devices Based on Fuzzing.
Autoři: a další
Zdroj: Security & Communication Networks; 6/28/2021, p1-14, 14p
-
16
Autoři:
Zdroj: Information & Communications Security: 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 - December 2, 2016, Proceedings; 2016, p376-391, 16p
-
17
Autoři: a další
Zdroj: Genetic Programming & Evolvable Machines; Jun2020, Vol. 21 Issue 1/2, p219-250, 32p
-
18
-
19
Autoři:
Zdroj: Information Systems Security: 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings; 2016, p263-282, 20p
-
20
Zdroj: Aroq - Just-Auto; Jul2021, p1-38, 3065p
Nájsť tento článok vo Web of Science
Full Text Finder