搜索结果: 1-7 共查到“hacking”相关记录7条 . 查询时间(0.067 秒)
HACKING SPATIAL DATA: AN EXAMPLE OF AGGREGATION PROBLEMS
Spatial aggregation Spatial data science Hacking spatial data Spatial autocorrelation
2018/11/8
Many applications using spatially aggregated data tend to treat the spatial units as given. For example, in the United States, analyses using the social and economic data often rely on the existing an...
Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks
serious violations input integrity
2017/6/22
We describe novel, adaptive user interface attacks, where the adversary attaches a small device to the interface that connects user input peripherals to the target system. The device executes the atta...
We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of the target binary or source code, against services that restart after a crash. This makes it pos...

Wireless devices used by casual pilots vulnerable to hacking, computer scientists find(图)
computer scientists find hacking
2014/12/1
San Diego, Calif., Nov. 10, 2014 -- A new class of apps and wireless devices used by private pilots during flights for everything from GPS information to data about nearby aircraft is vulnerable to a ...
Associate Professor Jane F Hacking,Department of Languages and Literature at the University of Utah
Associate Professor Jane F Hacking Department of Languages and Literature at the University of Utah
2014/3/6
Off-Path Hacking: The Illusion of Challenge-Response Authentication
challenge-response defenses cryptographic protocols
2014/3/7
Everyone is concerned about Internet security, yet most traffic is not cryptographically protected. Typical justification is that most attackers are off-path and cannot intercept traffic; hence, intui...