Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Dale Huff"'
Publikováno v:
ARES
Mitigating vulnerabilities in software requires first identifying the vulnerabilities with an organization’s software assets. This seemingly trivial task involves maintaining vendor product vulnerability notification for a kludge of hardware and so
Autor:
Qinghua Li, Philip Dale Huff
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783030900182
SecureComm (1)
SecureComm (1)
Current approaches for risk analysis of software vulnerabilities using manual assessment and numeric scoring do not complete fast enough to keep pace with the maintenance work rate to patch and mitigate the vulnerabilities. This paper proposes a new
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::68be55c7e58d2db0aa736a1cda17d6cb
https://doi.org/10.1007/978-3-030-90019-9_4
https://doi.org/10.1007/978-3-030-90019-9_4
Autor:
Philip Dale Huff, Qinghua Li
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783030900182
SecureComm (1)
SecureComm (1)
Cyber threat intelligence (CTI) sharing provides cybersecurity operations an advantage over adversaries by more quickly characterizing the threat, understanding its tactics, anticipating the objective, and identifying the vulnerability and mitigation
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::67e62b90d8dbfc7b64c9a3e7e8e48d40
https://doi.org/10.1007/978-3-030-90019-9_9
https://doi.org/10.1007/978-3-030-90019-9_9
Publikováno v:
CNS
Security vulnerabilities in firmware/software pose an important threat ton power grid security, and thus electric utility companies should quickly decide how to remediate vulnerabilities after they are discovered. Making remediation decisions is a ch
Autor:
Qinghua Li, Philip Dale Huff
Publikováno v:
ICST Transactions on Security and Safety. 8:170247
Remediating known software vulnerabilities is one of the most pressing operational challenges for personnel tasked with maintaining a secure system, mainly due to the large amount of vulnerabilities to analyze and mitigate. For computing environments
Publikováno v:
ACSAC
Traditional biometric authentication systems store biometric reference templates in cleartext on an authentication server, making them vulnerable to theft. Fuzzy extractors allow an authentication server to store biometric verification data that are
Publisher Summary This chapter describes a system for computer-assisted 3-D reconstruction of serial sections that can be obtained by any laboratory at a relatively low cost. It also discusses technical suggestions regarding specimen handling, data e
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::74e4ed794327ad4ebb3c8176ee0355dd
https://doi.org/10.1016/b978-0-12-185269-6.50035-7
https://doi.org/10.1016/b978-0-12-185269-6.50035-7
Autor:
Peter Århem, U. Arvidsson, Peter H. Barry, Pascale Boulenguez, Michael Brunner, Kevin Bush, James P. Butler, K. Carlsson, L. Charron, Brenda J. Claiborne, J.H. Cocatre-Zilgien, G. Colliot, R. John Cork, G. Corkidi, Frans Cornelissen, C. Costa, P. Delaère, F. Delcomyn, Victor H. Denenberg, C. Duyckaerts, Sverker Eneström, William S. Evans, M. Freire, Hugo Geerts, George L. Gerstein, James L. Hargrove, Diane K. Hartle, J.-J. Hauw, E.C. Hirsch, William R. Holmes, Christian Hoock, Dale Huff, Claire E. Hulsebosch, Martin G. Hulsey, Staffan Johansson, Michael L. Johnson, Stephen W. Jones, Gerry H. Kenner, Uwe T. Koch, Dimitri M. Kullmann, Hsin-yi Lee, O. Lejeune, Erich Lieth, J.P. Messier, K. Mossberg, Peter J. Munson, Robert G. Nagele, Rony Nuydens, Roger Nuyens, J.M. Peyronnard, Robert Pinard, Pierre Rage, G. Enrico Ravati, John Ross, Jean P. Royet, Louis Segu, W. Terrell Stamps, Brian R. Stromquist, Stéphane Swillens, M. Tajani, Mario Tiberi, Warren G. Tourtellotte, B. Ulfhake, Johannes D. Veldhuis, Lipo Wang
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c6f499b1f46383fb2a9e4bf43cb2c37b
https://doi.org/10.1016/b978-0-12-185269-6.50003-5
https://doi.org/10.1016/b978-0-12-185269-6.50003-5
Publikováno v:
Genetics in Medicine. 1:53
In order to study the pathogenesis of prenatal deformities, we reviewed maternal histories, delivery records, pathology reports, radiographs, and photographs of 90 fetuses with prenatally documented oligohydramnios at gestational ages from 14 weeks t