Jump to content

Search results

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • is a list of notable tools for static program analysis (program analysis is a synonym for code analysis). CodePeer ConQAT Fluctuat LDRA Testbed MALPAS...
    39 KB (1,197 words) - 21:08, 5 May 2025
  • phonemes. A phoneme is a basic unit of sound in a language. Prosody analysis: Processes the sentence structure, words, and phonemes to determine the...
    6 KB (895 words) - 18:50, 4 February 2023
  • Web analytics is the measurement, collection, analysis, and reporting of web data to understand and optimize web usage. Web analytics is not just a process...
    44 KB (6,055 words) - 17:36, 23 May 2025
  • to enable real-time analysis of security alerts generated by applications and network hardware. SIEM systems are central to security operations centers...
    28 KB (3,089 words) - 10:40, 3 June 2025
  • decision-making, and using feedback and tasking from them to drive the collection of the basic intelligence that we need to produce our analysis. Analytic tradecraft...
    68 KB (8,650 words) - 07:10, 31 March 2025
  • Thumbnail for Nmap
    Nmap (redirect from Nmap Scripting Engine)
    and asset management. Auditing the security of a network by identifying new servers. Generating traffic to hosts on a network, response analysis and response...
    24 KB (2,355 words) - 13:07, 27 December 2024
  • tagging. As part of processing and analysis, tokenization is applied to split the content into tokens which is the basic matching unit. It is also common...
    5 KB (547 words) - 14:26, 16 May 2024
  • GNU Octave - numerical-analysis GROMACS - simulations of proteins, lipids, and nucleic acids. JSBSim - flight dynamics engine LAMMPS - Molecular dynamics...
    75 KB (5,414 words) - 07:06, 5 June 2025
  • analytic products, each with different security classifications, time scales, and levels of detail. Intelligence analysis goes back to the beginning of history...
    27 KB (3,572 words) - 12:20, 12 February 2025
  • execute it. Analysis can focus on different aspects of the software including but not limited to: behavior, test coverage, performance and security. To be...
    9 KB (1,075 words) - 21:08, 23 May 2025
  • Thumbnail for Tigr (military vehicle)
    Yuchai-made YC V6 300 diesel engines. YJ2081A Command Car Vehicle – A basic 4×4 vehicle with four doors at the front and doors at the back with a winch...
    70 KB (6,099 words) - 08:20, 13 May 2025
  • VBScript (redirect from Visual Basic Script)
    (COM), based on classic Visual Basic and Active Scripting. It was popular with system administrators for managing computers and automating many aspects of...
    18 KB (2,096 words) - 11:41, 3 June 2025
  • other Microsoft security products; they all use the same anti-malware engine known as Microsoft Malware Protection Engine (MSMPENG) and virus definitions...
    53 KB (4,511 words) - 19:59, 19 February 2025
  • Thumbnail for Microsoft Access
    projects: Cirrus (codename for Access) and Thunder (codename for Visual Basic, where the Embedded Basic engine was used). After Access's premiere, the...
    59 KB (6,600 words) - 06:07, 28 May 2025
  • Thumbnail for HTTP 404
    automated methods of discovering whether a link is broken. Some search engines, like Yahoo and Google, use automated processes to detect soft 404s. Soft 404s...
    16 KB (1,945 words) - 23:09, 3 June 2025
  • Thumbnail for Cyc
    project that aims to assemble a comprehensive ontology and knowledge base that spans the basic concepts and rules about how the world works. Hoping to capture...
    28 KB (2,821 words) - 14:54, 1 May 2025
  • Intelligence). This uses broadband and narrowband analysis of acquired acoustic signatures from surface ships and submarines, although it can also be used for...
    2 KB (291 words) - 23:00, 5 March 2025
  • Thumbnail for BMP-3
    damaged, and 67 captured). BMP-3 – Basic version, as described. BMP-3M – KBP and Kurganmashzavod have upgraded the vehicle with a new engine and turret...
    80 KB (6,758 words) - 20:22, 15 April 2025
  • Thumbnail for Industrial espionage
    Industrial espionage (category Security breaches)
    purposes instead of purely national security. While political espionage is conducted or orchestrated by governments and is international in scope, industrial...
    65 KB (6,521 words) - 02:34, 26 May 2025
  • run flat inserts, and Lexan. Outside of the basic armoring package several defensive options are available to help improve the security of the automobile...
    8 KB (1,063 words) - 20:54, 30 December 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)