MyFinder is a unique search engine with a simple privacy concept in mind. We log your searches but none of the data, it's that simple.
ThreatFull disclosureLattice-based access controlProgramming complexityNetwork lateral movementEnvironmentCredential stuffingCyber threat intelligencePhishingCorruptionBuffer overflowMalware analysisData maskingSpace complexitySybil attackInformation warfareAdaptationCompromiseComputer configurationAccess controlSpoofing attackSalami attackSession fixationAnalysis of parallel algorithmsData-flow analysisInformation engineeringAnalysis of algorithmsDouble freeEventThreat modelMultilevel securityComputational complexityAttribute-based access controlData corruptionMultiphysics simulationInformation privacyFrontend and backendContext awarenessData miningInference attackClickjackingSoftware bugComplexity theoryAccess control matrixInteraction designData typeConcurrent userData processingTechnology strategyCryptanalysisManagement control systemBig dataAcquisitionData efficiencyInformation modelTrust boundarySide-channel attackTiming attackData extractionOperations securityDictionary attackRisk factorData domainMemory corruptionInputOperational riskMeet-in-the-middle attackBrute-force attackData profilingComplexityProportional set sizePersonal identifierData integrityData fusionArray data structureKnown-plaintext attackChange impact analysisBuffer over-readMultiprocessor system architectureParameter spaceSystem of systemsData collectionDimensionSoftware testabilityMathematicsTime complexitySample spaceSymbolic executionCombinatorial explosionNumberSpatial scaleResource contentionComposite data typeSituation analysisInformation technology controlsNoise floorMulti-agent systemComplex adaptive systemRelated-key attackData science