×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [devices vulnerable]
DSFS: Decentralized Security for Large Parallel File Systems Zhongying Niu, Hong Jiang, Ke Zhou, Dan Feng, Shuping Zhang, Tianming Yang, Dongliang Lei,
220 views
Native Code Execution Control for Attack Mitigation on Android
698 views
Practical Exploitation Using A Malicious Service Set Identifier (SSID) Deral Heiland
226 views
Fault Tolerance in Distributed Systems
30 views
Zhongying Niu, Hong Jiang, Ke Zhou , Dan Feng,
55 views
Practical Exploitation Using A Malicious Service Set Identifier (SSID)
66 views