210
Voted
CODASPY
9 years 10 months ago
2016 105
Voted
CODASPY
9 years 10 months ago
2016
In international military coalitions, situation awareness is achieved by gathering critical intel from different authorities. Authorities want to retain control over their data, a...
96
Voted
CODASPY
9 years 10 months ago
2016
With sustained growth of software complexity, finding security vulnerabilities in operating systems has become an important necessity. Nowadays, OS are shipped with thousands of ...
119
Voted
CODASPY
9 years 10 months ago
2016
Honeynet is a collection of honeypots that are set up to attract as many attackers as possible to learn about their patterns, tactics, and behaviors. However, existing honeypots s...
107
Voted
CODASPY
9 years 10 months ago
2016
Many mobile services consist of two components: a server providing an API, and an application running on smartphones and communicating with the API. An unresolved problem in this ...
|