1 Chapter 23 – Linux Security Chapter 24 – Windows and Windows Vista Security Windows vs. Linux Security EECS 710 Professor: Hossein Saiedian Presented.
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 9 Embedded Operating Systems: The Hidden Threat.
P REDICTING ZERO - DAY SOFTWARE VULNERABILITIES THROUGH DATA - MINING --T HIRD P RESENTATION Su Zhang 1.
Predicting zero-day software vulnerabilities through data-mining --Third Presentation