Exploit
332 Followers
Recent papers in Exploit
Managing and analyzing a huge number of low-level alerts is very difficult and exhausting for network administrators. Alert correlation methods have been proposed to decrease the number of alerts and make them more intelligible. Proposed... more
Technology has impacted businesses in different areas, and, consequently, many companies have found it necessary to make changes in their structures and business models to improve customer satisfaction. The objective was to quantify the... more
One of the key factors that endangers network security is software vulnerabilities. So, increasing growth of vulnerability emergence is a critical challenge in security management. Also, organizations constantly encounter the limited... more
A monitor is a widely-used concurrent programming abstraction that encapsulates all shared state between threads. Monitors can be classified as being either implicit or explicit depending on the primitives they provide. Implicit monitors... more
ABSTRACT Workplace learning is complex in form. It is explorative, social and creative enquiry, and because it is carried out in the socio‐political domain of the workplace, it is potentially exploitative of all who contribute. This paper... more