共 50 条
- [31] Exploitation of Security Vulnerability on Retirement 2024 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE, HPCA 2024, 2024, : 1 - 14
- [32] VULNERABILITY AND EXPLOITATION IN A GLOBALIZED WORLD INTERNATIONAL JOURNAL OF FEMINIST APPROACHES TO BIOETHICS, 2013, 6 (01): : 91 - 102
- [33] The Heavy Tails of Vulnerability Exploitation ENGINEERING SECURE SOFTWARE AND SYSTEMS (ESSOS 2015), 2015, 8978 : 133 - 148
- [35] A novel automatic severity vulnerability assessment framework Journal of Communications, 2015, 10 (05): : 320 - 329
- [37] Exploitation assessment of selected technical objects using taxonomic methods Loska, A. (Andrzej.Loska@polsl.pl), 1600, Polish Academy of Sciences Branch Lublin (15):
- [38] Roles and assessment methods for models of sensor data exploitation algorithms MODELING AND SIMULATION FOR DEFENSE SYSTEMS AND APPLICATIONS VI, 2011, 8060
- [39] Exploitation of quantitative methods for the assessment of regional performance of the Slovak economy 2ND INTERNATIONAL SCIENTIFIC CONFERENCE - CONTEMPORARY ISSUES IN BUSINESS, MANAGEMENT AND EDUCATION 2013, 2014, 110 : 215 - 222
- [40] EXPLOITATION ASSESSMENT OF SELECTED TECHNICAL OBJECTS USING TAXONOMIC METHODS EKSPLOATACJA I NIEZAWODNOSC-MAINTENANCE AND RELIABILITY, 2013, 15 (01): : 1 - 8