421-427 of 418,000 results
Open links in new tab
  1. Our research on developing a method to systematically exploit the digitalization potential of business processes included two design cycles. In both design cycles, we reflected on the …

  2. Car-ramming attacks, or vehicular assaults, in which drivers deliberately plow their vehicles into public gatherings, pedestrians, or bicyclists, have become an increasingly common terrorist …

  3. Jun 9, 2015 · Duqu 2.0 Duqu 2.0 was discovered by Kaspersky Lab early this year and was named as such due to its close similarity to original Duqu malware.

  4. their optimal depth is apriori unknown, requiring extensive architecture search or inefficient ensemble of models of varying depths; and (2) their skip connections impose an unnecessarily …

  5. The task of automated exploit generation is to translate some exploit description into code for the virtual machine instruction set architecture, im-plicitly set by the memory state of the …

  6. The theoretical premise underlying this investigation is that control processes act to minimize the amount of interference in the cognitive system, particularly when an ongoing task is highly …

  7. Exploit programming has been a productive empirical study of these accidental or unanticipated machines and models and of the ways they emerge from bugs, composition, and cross-layer …