233
Voted
CODASPY
10 years 3 days ago
2016 114
Voted
CODASPY
10 years 3 days ago
2016
In international military coalitions, situation awareness is achieved by gathering critical intel from different authorities. Authorities want to retain control over their data, a...
103
Voted
CODASPY
10 years 3 days ago
2016
With sustained growth of software complexity, finding security vulnerabilities in operating systems has become an important necessity. Nowadays, OS are shipped with thousands of ...
127
Voted
CODASPY
10 years 3 days ago
2016
Honeynet is a collection of honeypots that are set up to attract as many attackers as possible to learn about their patterns, tactics, and behaviors. However, existing honeypots s...
120
Voted
CODASPY
10 years 3 days ago
2016
Many mobile services consist of two components: a server providing an API, and an application running on smartphones and communicating with the API. An unresolved problem in this ...
|