-
-
NIST SP800-45.pdf
... technology that underpins email is
ubiquitous, it is well understood and attackers are able to develop attack methods to exploit the
technology. Mail servers are also targeted because they (and public Web servers) must
communicate to some degree with ...
-
NIST SP800-45v2.pdf
... technologies that underlie email are ubiquitous and well-understood by many, attackers are able to develop attack methods to exploit security weaknesses. Mail servers are also targeted because they (and public Web servers) must communicate to some degree ...
-
NIST SP800-81-2.pdf
... access to the resources whose domain names are handled by the attacked DNS components. This document presents guidelines for configuring DNS deployments to prevent many denial-of-service attacks that exploit vulnerabilities in various DNS components.
-
lssvm工具箱1_8.pdf
... . LS-SVMs are closely related to regularization networks [10] and Gaussian processes [51] but additionally emphasize and exploit primal-dual interpretations. Links between kernel versions of classical pattern recognition algorithms such as kernel Fisher ...
-
-
drozer-install-2.3.4.zip
drozer是一款针对Android系统的安全检测框架,Drozer可以通过与Dalivik VM,其它应用程序的IPC断电以及底层操作系统的交互,避免正处于开发阶段,或者部署于你的组织的Android应用程序和设备暴露出不可接受的安全风险。
drozer提供了很多Android平台下的渗透测试exploit供你使用和分享
-
-
人脸识别、行人ReID图像分割
... parsing model to bridge the cross-domain differences in terms of visual appearance and environment conditions and fully exploit commonalities across domains. Our
proposed model explicitly learns a feature compensation network, which is specialized for ...
-
CVPR2019-ocr.zip
... and variable-length input
sequences. In this paper, we exploit the outstanding capability
of path signature to translate ... fully convolutional recurrent
network (MC-FCRN) is proposed to exploit the multiple spatial
contexts from the signature feature maps ...
-
CISSP 认证详细知识点总结-中英文对照翻译.docx
... 弱点)。
■ A threat is the possibility that someone or something would exploit a vulnerability, intentionally or accidentally, and cause harm to an asset.
■ 威胁 ...
-