This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | Next revision Both sides next revision | ||
research_activities [2017/06/22 02:02] fabio.massacci@unitn.it [Hotter Topics] |
research_activities [2017/06/26 10:06] fabio.massacci@unitn.it [Hotter Topics] |
||
---|---|---|---|
Line 10: | Line 10: | ||
* [[Security Economics]] | * [[Security Economics]] | ||
* [[Validation of Risk and Security Requirements Methodologies|Empirical Methods for Security Risk Assessment]] | * [[Validation of Risk and Security Requirements Methodologies|Empirical Methods for Security Risk Assessment]] | ||
- | * [[Vulnerability_discovery_models|How to find and assess vulnerabilities?]] | + | * [[Vulnerability_discovery_models|How to Find and Assess (Dangerous) Vulnerabilities?]] |
* [[malware_analysis|Cyber Security Testbeds and Malware Testing]] | * [[malware_analysis|Cyber Security Testbeds and Malware Testing]] | ||