-
1
Research on key technology of vulnerability threat classification
Published 2012-09-01Subjects: Get full text
Article -
2
Design and implementation of national security vulnerability database
Published 2011-01-01Subjects: Get full text
Article -
3
Research on OLE object vulnerability analysis for RTF file
Published 2016-01-01Subjects: Get full text
Article -
4
A general attack model based on Android system vulnerability
Published 2016-10-01Subjects: Get full text
Article -
5
Vulnerability Testing and Analysis on Websites and Web-Based Applications in the XYZ Faculty Environment Using Acunetix Vulnerability
Published 2024-12-01Subjects: “…Vulnerability, Website, Application, FK UNAND, Acunetix Web Vulnerability Scanner…”
Get full text
Article -
6
Design and implementation of OSPF vulnerability analysis and detection system
Published 2013-09-01Subjects: Get full text
Article -
7
Assessment of vulnerability to fluvial floods: Case of municipalities of the Gidra River Basin, Slovakia
Published 2024-08-01Subjects: Get full text
Article -
8
Desenvolvimento de um índice de vulnerabilidade em saúde nos municípios do Ceará
Published 2023-12-01Subjects: “…Ceará; health; vulnerability…”
Get full text
Article -
9
Survey on industrial control protocol security research
Published 2024-06-01Subjects: Get full text
Article -
10
Survey on static software vulnerability detection for source code
Published 2019-02-01Subjects: “…software vulnerability…”
Get full text
Article -
11
Java deserialization vulnerability defense technologybased on run-time detection
Published 2024-04-01Subjects: “…deserialization vulnerability…”
Get full text
Article -
12
Urbaniser les zones inondables, est-ce concevable ?
Published 2008-11-01Subjects: Get full text
Article -
13
CONSTRUCCIÓN TERRITORIAL, VULNERABILIDAD SOCIAL Y CALIDAD AMBIENTAL EN EL EJIDO DE VILLA PEHUENIA, PROVINCIA DEL NEUQUÉN, ARGENTINA
Published 2014-12-01Subjects: Get full text
Article -
14
L’éruption du Tajogaite (Cumbre Vieja) à La Palma, Canaries : de l’éruption volcanique à la crise territoriale
Published 2023-06-01Subjects: “…vulnerability…”
Get full text
Article -
15
PROSPECTS AND CHALLENGES OF RESCUING THE SHRINKING LAKE CHAD THROUGH THE UNITED NATIONS’ GREEN CLIMATE FUND
Published 2023-07-01Subjects: “…Vulnerability…”
Get full text
Article -
16
A detection method of Android system vulnerabilities based on matching
Published 2016-05-01Subjects: Get full text
Article -
17
Vulnerabilidade de inserção no mercado de trabalho dos jovens moradores de favelas de Belo Horizonte
Published 2019-01-01Subjects: “…vulnerability…”
Get full text
Article -
18
-
19
-
20
Game-based detection method of broken access control vulnerabilities in Web application
Published 2024-06-01Subjects: Get full text
Article