نتایج جستجو برای: in exploited area

تعداد نتایج: 17016384  

Journal: :International Journal of Current Microbiology and Applied Sciences 2018

Journal: :IEEE Transactions on Dependable and Secure Computing 2021

Vulnerabilities with publically known exploits typically form 2-7% of all vulnerabilities reported for a given software version. With smaller number exploited compared the total vulnerabilities, it is more difficult to model and predict when vulnerability exploit will be reported. In this paper, we introduce an approach predicting discovery pattern using software. Eight commonly used models (VD...

2001
Rameshsharma Ramloll John Mariani

In this technical note, we illustrate a possible application of gaze tracking in the auditory domain. We show how coupling the position of gaze with that of a sound sensor provides a number of new interaction opportunities at information rich interfaces involving auditory landscapes. We describe our strategy for exploring this browsing technique and introduce the application area where it will ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید