Terminal control apparatus and terminal control method
Testing software applications with schema-based fuzzing
Threat personalization
Threat protection network
Tool, method, and program for supporting system security...
Using a benevolent worm to assess and correct computer...
Using fuzzy classification models to perform matching...
Vulnerability assessment and authentication of a computer by...
Vulnerability assessment of disk images
Webcrawl internet security analysis and process
Webcrawl internet security analysis and process