>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-7 共查到hacking相关记录7条 . 查询时间(0.067 秒)
Many applications using spatially aggregated data tend to treat the spatial units as given. For example, in the United States, analyses using the social and economic data often rely on the existing an...
We describe novel, adaptive user interface attacks, where the adversary attaches a small device to the interface that connects user input peripherals to the target system. The device executes the atta...
We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of the target binary or source code, against services that restart after a crash. This makes it pos...
San Diego, Calif., Nov. 10, 2014 -- A new class of apps and wireless devices used by private pilots during flights for everything from GPS information to data about nearby aircraft is vulnerable to a ...
Associate Professor, Languages And Literature, University of Utah;he former Yugoslav Republic of MacedoniaAssociate Professor, Languages And Literature, University of Utah,djunct Associate Professor, ...
Everyone is concerned about Internet security, yet most traffic is not cryptographically protected. Typical justification is that most attackers are off-path and cannot intercept traffic; hence, intui...
March 12, 2007,The groundbreaking course, being launched in the North East, will help organisations and individuals defend their computer systems against malicious attack and computer terrorism.

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...