Hacker Newsnew | past | comments | ask | show | jobs | submit | BillPollak's submissionslogin
1.Rust Vulnerability Analysis and Maturity Challenges (cmu.edu)
2 points by BillPollak on Jan 24, 2023 | past
2.10 Years of Research in Technical Debt and an Agenda for the Future (cmu.edu)
2 points by BillPollak on Aug 22, 2022 | past
3.DNS over HTTPS: 3 Strategies for Enterprise Security Monitoring (cmu.edu)
3 points by BillPollak on Aug 11, 2021 | past
4.Characterizing and Detecting Mismatch in Machine-Learning Systems (cmu.edu)
1 point by BillPollak on May 18, 2021 | past
5.Requirements in Model-Based Systems Engineering (MBSE) (cmu.edu)
1 point by BillPollak on Feb 22, 2021 | past
6.Three Ransomware Defense Strategies (cmu.edu)
1 point by BillPollak on Nov 10, 2020 | past
7.A Public Repository of Data for Static-Analysis Classification Research (cmu.edu)
2 points by BillPollak on Nov 6, 2020 | past
8.Three Places to Start in Defending Against Ransomware (cmu.edu)
1 point by BillPollak on Oct 12, 2020 | past
9.Ransomware as a Service (RaaS) Threats (cmu.edu)
3 points by BillPollak on Oct 6, 2020 | past
10.Steps for Migrating Existing Applications to Microservices (cmu.edu)
1 point by BillPollak on Sept 29, 2020 | past
11.Balancing Cyber Confidence and Privacy Concerns (cmu.edu)
1 point by BillPollak on Sept 21, 2020 | past
12.Managing the Risks of Adopting AI Engineering (cmu.edu)
3 points by BillPollak on Aug 17, 2020 | past
13.Migrating Applications to Kubernetes (cmu.edu)
2 points by BillPollak on Aug 10, 2020 | past | 1 comment
14.Verifying Timing in Undocumented Multicore Processors (cmu.edu)
1 point by BillPollak on Aug 3, 2020 | past
15.Agile Cybersecurity (cmu.edu)
1 point by BillPollak on July 22, 2020 | past
16.Situational Awareness for Cybersecurity Architecture: 5 Recommendations (cmu.edu)
2 points by BillPollak on July 13, 2020 | past
17.Detecting Mismatches in Machine-Learning Systems (cmu.edu)
2 points by BillPollak on June 29, 2020 | past
18.A Solution for High Assurane Software-Defined IoT Security (cmu.edu)
1 point by BillPollak on June 17, 2020 | past
19.Covid-19 and Supply-Chain Risk (cmu.edu)
1 point by BillPollak on June 8, 2020 | past
20.Three Risks in Building Machine Learning Systems (cmu.edu)
2 points by BillPollak on May 18, 2020 | past
21.Situational Awareness for Cybersecurity: Tools for Monitoring and Response (cmu.edu)
6 points by BillPollak on May 12, 2020 | past
22.Managing Time as the Limiting Resource (cmu.edu)
2 points by BillPollak on May 4, 2020 | past
23.Sixteen Guiding Principles for System Resilience (cmu.edu)
1 point by BillPollak on April 28, 2020 | past
24.Automatically Detecting Technical Debt Discussions with Machine Learning (cmu.edu)
2 points by BillPollak on April 13, 2020 | past
25.Seven Quick Steps to Using Containers Securely (cmu.edu)
3 points by BillPollak on April 7, 2020 | past
26.Situational Awareness for Cybersecurity Architecture: Network Visibility (cmu.edu)
3 points by BillPollak on March 24, 2020 | past
27.Using Machine Learning to Detect Design Patterns (cmu.edu)
2 points by BillPollak on March 19, 2020 | past
28.Automated Techniques to Repair C Code to Eliminate Memory-Safety Vulnerabilities (cmu.edu)
2 points by BillPollak on Feb 25, 2020 | past
29.Programmer Moneyball: Challenging the Myth of Individual Programmer Productivity (cmu.edu)
3 points by BillPollak on Jan 28, 2020 | past
30.Achieving the Quantum Advantage in the NISQ Era (cmu.edu)
1 point by BillPollak on Dec 16, 2019 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: