- Presentations
- Documents
- Infographics
기계학습을 이용하여 정적 분석기의 안전성을 선별적으로 조절하는 방법
NAVER Engineering
•
6 years ago
Sandboxing JS and HTML. A lession Learned
Minded Security
•
8 years ago
Bridgewater's Model-Based Verification of AWS Security Controls
Amazon Web Services
•
5 years ago
Securing RESTful services with Spring HATEOAS & Hdiv
Hdiv Security
•
7 years ago
IoT Developer Survey 2017
Ian Skerrett
•
7 years ago
2014 04-AMPlifying-docker-at-451-hcts-eu
Alex Heneveld
•
10 years ago
Popular Approaches to Preventing Code Injection Attacks are Dangerously Wrong
Waratek Ltd
•
6 years ago
Machine Learning for Software Maintainability
Valerio Maggio
•
10 years ago
Digital Product Security
SoftServe
•
7 years ago
Security Services and Approach by Nazar Tymoshyk
SoftServe
•
8 years ago
Unit testing : what are you missing for security
Suman Sourav
•
8 years ago
Dytan: A Generic Dynamic Taint Analysis Framework (ISSTA 2007)
James Clause
•
10 years ago
What Good is this Tool? A Guide to Choosing the Right Application Security Testing Tools
Kevin Fealey
•
9 years ago
The Gremlin in the Graph
Marko Rodriguez
•
13 years ago
CODE BLUE 2016 - Method of Detecting Vulnerability in Web Apps
Isao Takaesu
•
7 years ago
에니어그램 9가지 유형
Jinho Jung
•
14 years ago
A Survey on Dynamic Symbolic Execution for Automatic Test Generation
Sung Kim
•
9 years ago
I Know You Want Me - Unplugging PlugX
Takahiro Haruyama
•
10 years ago