United States Computer Emergency Readiness Team

Known as: Industrial Control Systems Joint Working Group, Computer Emergency Readiness Team, US CERT 
The United States Computer Emergency Readiness Team (US-CERT) is an organization within the Department of Homeland Security’s (DHS) National… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
This paper reports on the development of Compositional CompCert, the first verified separate compiler for C. Specifying and… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2014
Highly Cited
2014
In distributed reflective denial-of-service (DRDoS) attacks, adversaries send requests to public servers (e.g., open recursive… (More)
  • figure 1
  • table I
  • table II
  • table III
  • table IV
Is this relevant?
2013
2013
The 21st century has seen an enormous and almost sudden expansion in the use and types of technology. However, the cyber-age has… (More)
  • table 1
  • table 2
  • figure 1.2
  • figure 1.3
Is this relevant?
2012
2012
Care of the patient with shock can be one of the most challenging issues in emergency medicine and critical care. Even the most… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2011
2011
The rapid growth of the Information & Communication Technology (ICT) systems and network infrastructures have cause the Internet… (More)
  • table I
  • table II
  • table IV
  • table III
Is this relevant?
2008
2008
A study conducted by the U.S. Secret Service and the Carnegie Mellon University Software Engineering Institute CERT Program… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2006
2006
Preventing exploits from compromising software applications requires a fundamental understanding of how they are being exploited… (More)
  • figure 3.2
  • figure 3.1
  • figure 4.1
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?