Zobrazeno 1 - 10
of 657
pro vyhledávání: '"Doupé A"'
Autor:
Akl Elie A, Kennedy Caitlin, Konda Kelika, Caceres Carlos F, Horvath Tara, Ayala George, Doupe Andrew, Gerbase Antonio, Wiysonge Charles, Segura Eddy R, Schünemann Holger J, Lo Ying-Ru
Publikováno v:
BMC Public Health, Vol 12, Iss 1, p 386 (2012)
Abstract Background The World Health Organization (WHO) Department of HIV/AIDS led the development of public health guidelines for delivering an evidence-based, essential package of interventions for the prevention and treatment of HIV and other sexu
Externí odkaz:
https://doaj.org/article/05972641d534461c9c603c6d018020c4
Autor:
Mei, Xiang, Singaria, Pulkit Singh, Del Castillo, Jordi, Xi, Haoran, Abdelouahab, Benchikh, Bao, Tiffany, Wang, Ruoyu, Shoshitaishvili, Yan, Doupé, Adam, Pearce, Hammond, Dolan-Gavitt, Brendan
High-quality datasets of real-world vulnerabilities are enormously valuable for downstream research in software security, but existing datasets are typically small, require extensive manual effort to update, and are missing crucial features that such
Externí odkaz:
http://arxiv.org/abs/2408.02153
Autor:
Guo, Ziyi, Le, Dang K, Lin, Zhenpeng, Zeng, Kyle, Wang, Ruoyu, Bao, Tiffany, Shoshitaishvili, Yan, Doupé, Adam, Xing, Xinyu
Recently, a novel method known as Page Spray emerges, focusing on page-level exploitation for kernel vulnerabilities. Despite the advantages it offers in terms of exploitability, stability, and compatibility, comprehensive research on Page Spray rema
Externí odkaz:
http://arxiv.org/abs/2406.02624
Autor:
Schultz, Douglas, Stephan, Johannes, Sieber, Julian, Yeh, Trudie, Kunz, Manuel, Doupe, Patrick, Januschowski, Tim
This paper proposes a novel method for demand forecasting in a pricing context. Here, modeling the causal relationship between price as an input variable to demand is crucial because retailers aim to set prices in a (profit) optimal manner in a downs
Externí odkaz:
http://arxiv.org/abs/2312.15282
Identifying the actual adversarial threat against a system vulnerability has been a long-standing challenge for cybersecurity research. To determine an optimal strategy for the defender, game-theoretic based decision models have been widely used to s
Externí odkaz:
http://arxiv.org/abs/2210.15011
Autor:
Kalantari, Faezeh, Zaeifi, Mehrnoosh, Bao, Tiffany, Wang, Ruoyu, Shoshitaishvili, Yan, Doupé, Adam
Cross-site scripting (XSS) is the most common vulnerability class in web applications over the last decade. Much research attention has focused on building exploit mitigation defenses for this problem, but no technique provides adequate protection in
Externí odkaz:
http://arxiv.org/abs/2204.08592
Automatically Mitigating Vulnerabilities in Binary Programs via Partially Recompilable Decompilation
Vulnerabilities are challenging to locate and repair, especially when source code is unavailable and binary patching is required. Manual methods are time-consuming, require significant expertise, and do not scale to the rate at which new vulnerabilit
Externí odkaz:
http://arxiv.org/abs/2202.12336
Publikováno v:
In Geriatric Nursing September-October 2024 59:639-645
Autor:
Schrom, Edward, Kinzig, Ann, Forrest, Stephanie, Graham, Andrea L., Levin, Simon A., Bergstrom, Carl T., Castillo-Chavez, Carlos, Collins, James P., de Boer, Rob J., Doupé, Adam, Ensafi, Roya, Feldman, Stuart, Halderman, Bryan T. Grenfell. Alex, Huijben, Silvie, Maley, Carlo, Mosesr, Melanie, Perelson, Alan S., Perrings, Charles, Plotkin, Joshua, Rexford, Jennifer, Tiwari, Mohit
We explore the commonalities between methods for assuring the security of computer systems (cybersecurity) and the mechanisms that have evolved through natural selection to protect vertebrates against pathogens, and how insights derived from studying
Externí odkaz:
http://arxiv.org/abs/2107.10344
Autor:
Bitaab, Marzieh, Cho, Haehyun, Oest, Adam, Zhang, Penghui, Sun, Zhibo, Pourmohamad, Rana, Kim, Doowon, Bao, Tiffany, Wang, Ruoyu, Shoshitaishvili, Yan, Doupé, Adam, Ahn, Gail-Joon
As the COVID-19 pandemic started triggering widespread lockdowns across the globe, cybercriminals did not hesitate to take advantage of users' increased usage of the Internet and their reliance on it. In this paper, we carry out a comprehensive measu
Externí odkaz:
http://arxiv.org/abs/2103.12843