CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 资源下载 文档资料 行业发展研究 搜索资源 - Incident

搜索资源列表

  1. A-Taxonomy-and-Adversarial-Model-for

    0下载:
  2. In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have been put forth to sanitize this sensitive data source in order to
  3. 所属分类:Development Research

    • 发布日期:2017-03-24
    • 文件大小:525369
    • 提供者:张倩倩
  1. Taxonomyof-Software-Vulnerabilities

    0下载:
  2. 软件漏洞是发生安全事件的根源,当软件漏洞被利用时,会造成严重的后果。-The vulnerabilities of software are the root of most security incident. When these vulnerabilities can be exploited, this has a seriousimpact.
  3. 所属分类:Development Research

    • 发布日期:2017-12-08
    • 文件大小:73863
    • 提供者:lijie
  1. Predicting-the-geo-temporal-variation-of-crime-an

    0下载:
  2. Traditional police boundaries—precincts, patrol districts, etc.—often fail to reflect the true distribution of criminal activity and thus do little to assist in the optimal allocation of police resources. This paper introduces methods for crime inc
  3. 所属分类:Development Research

    • 发布日期:2017-04-04
    • 文件大小:540124
    • 提供者:ahmed
搜珍网 www.dssz.com