Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Practical Science
Genetic Algorithm, in Reverse Mode
Today I would like to discuss running genetic algorithm… backwards. Yes, this is possible....
Date: 07/24/2017
Is Pluto a Planet?
Is Pluto a planet? And how is that question related to Data Science? For sure, physical properties...
Date: 05/25/2016
Equation of a Fuzzing Curve -- Part 2/2
Follow-up notes and discussion See Part 1 here. Can you predict how many bugs will be found at...
Date: 01/06/2015
Equation of a Fuzzing Curve -- Part 1/2
Equation of a Fuzzing Curve Introduction While fuzzing, you may need to extrapolate or describe...
Date: 12/18/2014
Estimating Hidden Bug Count -- Part 3/3
Part 4: Step By Step Guide This is just a summary of the previous chapters as a flow chart (click...
Date: 10/03/2014
Estimating Hidden Bug Count -- Part 2/3
Previous part: introduction and simpler theory Next: Flowchart Summary and Limitations Part 3: Harsh...
Date: 09/30/2014
Estimating Hidden Bug Count -- Part 1/3
Part 1: Introduction and Basic Theory Part 2: Accounting for Bug Fixes Part 3: Flowchart Summary and...
Date: 09/30/2014
Practice and Theory of Security Reviews -- Part 3
Problem introduction and disclaimer. Security Review Heuristics Zoo. Part 3 -- Reflections Or rather...
Date: 08/04/2014
Security Reviews: The Heuristics Zoo, Part 1/2
Initially meant to fit into one chapter, this text grew quickly and I had to split it into two. So...
Date: 07/23/2014
More on 2.0 changes: Delegates Security
================================= The text below is provided "AS IS", without any responsibilities...
Date: 06/08/2005
FullTrust means Full Trust
The text below is provided "AS IS", without any responsibilities attached to it. It represents...
Date: 05/06/2005
Some tips on testing managed code Security.
<Disclaimer> The text below represents author's personal opinion and does not necessarily...
Date: 03/10/2004
Sample of non-CAS custom permission with declarative form supported.
Why? Recently, I started seeing numerous requests regarding creation of custom permissions that do...
Date: 03/10/2004
How to Demand several StrongNameIdentityPermissions "at the same time" in 1.0 and 1.1.
Problem Statement: Code Access Security provides developers with numerous ways of protecting their...
Date: 03/10/2004