搜索资源列表
A-Taxonomy-and-Adversarial-Model-for
- In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have been put forth to sanitize this sensitive data source in order to
Taxonomyof-Software-Vulnerabilities
- 软件漏洞是发生安全事件的根源,当软件漏洞被利用时,会造成严重的后果。-The vulnerabilities of software are the root of most security incident. When these vulnerabilities can be exploited, this has a seriousimpact.
Predicting-the-geo-temporal-variation-of-crime-an
- Traditional police boundaries—precincts, patrol districts, etc.—often fail to reflect the true distribution of criminal activity and thus do little to assist in the optimal allocation of police resources. This paper introduces methods for crime inc