Compartilhar via


Eugene Bobukh's Blog

Practical Science

Genetic Algorithm, in Reverse Mode

Today I would like to discuss running genetic algorithm… backwards. Yes, this is possible....

Date: 07/24/2017

Is Pluto a Planet?

Is Pluto a planet? And how is that question related to Data Science? For sure, physical properties...

Date: 05/25/2016

Equation of a Fuzzing Curve -- Part 2/2

Follow-up notes and discussion See Part 1 here. Can you predict how many bugs will be found at...

Date: 01/06/2015

Equation of a Fuzzing Curve -- Part 1/2

Equation of a Fuzzing Curve Introduction While fuzzing, you may need to extrapolate or describe...

Date: 12/18/2014

Estimating Hidden Bug Count -- Part 3/3

Part 4: Step By Step Guide This is just a summary of the previous chapters as a flow chart (click...

Date: 10/03/2014

Estimating Hidden Bug Count -- Part 2/3

Previous part: introduction and simpler theory Next: Flowchart Summary and Limitations Part 3: Harsh...

Date: 09/30/2014

Estimating Hidden Bug Count -- Part 1/3

Part 1: Introduction and Basic Theory Part 2: Accounting for Bug Fixes Part 3: Flowchart Summary and...

Date: 09/30/2014

Practice and Theory of Security Reviews -- Part 3

Problem introduction and disclaimer. Security Review Heuristics Zoo. Part 3 -- Reflections Or rather...

Date: 08/04/2014

Security Reviews: The Heuristics Zoo, Part 1/2

Initially meant to fit into one chapter, this text grew quickly and I had to split it into two. So...

Date: 07/23/2014

More on 2.0 changes: Delegates Security

================================= The text below is provided "AS IS", without any responsibilities...

Date: 06/08/2005

FullTrust means Full Trust

The text below is provided "AS IS", without any responsibilities attached to it. It represents...

Date: 05/06/2005

Some tips on testing managed code Security.

<Disclaimer> The text below represents author's personal opinion and does not necessarily...

Date: 03/10/2004

Sample of non-CAS custom permission with declarative form supported.

Why? Recently, I started seeing numerous requests regarding creation of custom permissions that do...

Date: 03/10/2004

How to Demand several StrongNameIdentityPermissions "at the same time" in 1.0 and 1.1.

Problem Statement: Code Access Security provides developers with numerous ways of protecting their...

Date: 03/10/2004