KEMBAR78
Nurul haszeli ahmad
Nurul Haszeli Ahmad, profile picture

Nurul Haszeli Ahmad

Sort by
Ontology model for c overflow vulnerabilities attack
Agile Project Management: Introduction to AGILE - The Basic 101
Windows Services 101
A SOURCE CODE PERSPECTIVE C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY BASED ON WELL-DEFINED CRITERIA - Viva Presentation
C Overflows Vulnerabilities Exploit Taxonomy And Evaluation on Static Analysis Tools - Mock Viva for Msc Studies
VULNERABILITIES AND EXPLOITATION IN COMPUTER SYSTEM – PAST, PRESENT, AND FUTURE
Introduction to UML
Introduction To TRIZ
Understanding Vulnerability by Refining Taxonomy