L. Wang and B. S. Zhou, “The study of enterprise model,” Computer Engineeri...
L. Wang and B. S. Zhou, “The study of enterprise model,” Computer Engineering and Application, 1002– 8331–(2001)12–0005–05. **”L. Wang and B. S. Zhou, “The study […]
No views yet
Workflow Management Coalition, “Workflow management coalition terminology a...
Workflow Management Coalition, “Workflow management coalition terminology and glossary,” Technical Report, WfMCTC–1011, Brussels: Workflow Management Coalition, 1996. None
No views yet
R. P. Lippmann, D. J. Fried, I. Graf, et al., “Evaluating intrusion detecti...
R. P. Lippmann, D. J. Fried, I. Graf, et al., “Evaluating intrusion detection systems: The 1998 DARPA offline intrusion detection evaluation,” in: Proceedings of the […]
1 total views, 1 today
SANS Institute: Lion worm. http://www.sans.o-rg/y2k/ lion.htm.
SANS Institute: Lion worm. http://www.sans.o-rg/y2k/ lion.htm. **SANS Institute: Lion worm. http://www.sans.o-rg/y2k/ lion.htm.** — When you see a cryptic line like “SANS Institute: Lion worm. http://www.sans.o-rg/y2k/ […]
1 total views, 1 today
Viruslist.com: Net-Worm. Linux. Adm. http://www.viruslist.com/en/viruses/en...
Viruslist.com: Net-Worm. Linux. Adm. http://www.viruslist.com/en/viruses/encyclopedia?virusid=23854. Okay, let’s tackle this query. The user wants a blog post based on that specific quote. First, I need to […]
No views yet
C. CAN-2003-0245. Apache apr-psprintf memory corruption vulnerability. http...
C. CAN-2003-0245. Apache apr-psprintf memory corruption vulnerability. http://www.securityfocus.com/bi-d/7723/ discussion/. **C. CAN-2003-0245. Apache apr‑psprintf memory corruption vulnerability. http://www.securityfocus.com/bi‑d/7723/ discussion/.** — When it comes to web server […]
1 total views, 1 today
Symantec Security Response: CodeRed Worm. http://www. sarc.com/avcenter/ven...
Symantec Security Response: CodeRed Worm. http://www. sarc.com/avcenter/venc/data/codered.worm.html. Okay, I need to write a blog post based on the quote provided. The title of the post […]
2 total views, 2 today
J. Xu, P. Ning, C. Kil, Y. Zhai, and C. Bookholt, “Automatic diagnosis and ...
J. Xu, P. Ning, C. Kil, Y. Zhai, and C. Bookholt, “Automatic diagnosis and response to memory corruption vulnerabilities,” in: Proceedings of the ACM CCS […]
2 total views, 2 today
J. R. Crandall, Su Zhen Dong, S. F. Wu, and F. T. Chong, “On deriving unkno...
J. R. Crandall, Su Zhen Dong, S. F. Wu, and F. T. Chong, “On deriving unknown vulnerabilities from Zero Day polymorphic and metamorphic worm exploits,” […]
2 total views, 2 today
J . R. Crandall, S. F. Wu, and F. T. Chong, “Experiences using Minos as a t...
J . R. Crandall, S. F. Wu, and F. T. Chong, “Experiences using Minos as a tool for capturing and analyzing novel worms for unknown […]
2 total views, 2 today
Recent Comments