Eugene Bobukh's Blog
Practical Science
Genetic Algorithm, in Reverse Mode
Today I would like to discuss running genetic algorithm… backwards. Yes, this is possible....
Date: 07/24/2017
Is Pluto a Planet?
Is Pluto a planet? And how is that question related to Data Science? For sure, physical properties...
Date: 05/25/2016
Equation of a Fuzzing Curve -- Part 2/2
Follow-up notes and discussion See Part 1 here. Can you predict how many bugs will be found at...
Date: 01/06/2015
Equation of a Fuzzing Curve -- Part 1/2
Equation of a Fuzzing Curve Introduction While fuzzing, you may need to extrapolate or describe...
Date: 12/18/2014
Estimating Hidden Bug Count -- Part 3/3
Part 4: Step By Step Guide This is just a summary of the previous chapters as a flow chart (click...
Date: 10/03/2014
Estimating Hidden Bug Count -- Part 2/3
Previous part: introduction and simpler theory Next: Flowchart Summary and Limitations Part 3: Harsh...
Date: 09/30/2014
Estimating Hidden Bug Count -- Part 1/3
Part 1: Introduction and Basic Theory Part 2: Accounting for Bug Fixes Part 3: Flowchart Summary and...
Date: 09/30/2014
Practice and Theory of Security Reviews -- Part 3
Problem introduction and disclaimer. Security Review Heuristics Zoo. Part 3 -- Reflections Or rather...
Date: 08/04/2014
Security Reviews: The Heuristics Zoo, Part 1/2
Initially meant to fit into one chapter, this text grew quickly and I had to split it into two. So...
Date: 07/23/2014
More on 2.0 changes: Delegates Security
================================= The text below is provided "AS IS", without any responsibilities...
Date: 06/08/2005
FullTrust means Full Trust
The text below is provided "AS IS", without any responsibilities attached to it. It represents...
Date: 05/06/2005
Some tips on testing managed code Security.
<Disclaimer> The text below represents author's personal opinion and does not necessarily...
Date: 03/10/2004
Sample of non-CAS custom permission with declarative form supported.
Why? Recently, I started seeing numerous requests regarding creation of custom permissions that do...
Date: 03/10/2004
How to Demand several StrongNameIdentityPermissions "at the same time" in 1.0 and 1.1.
Problem Statement: Code Access Security provides developers with numerous ways of protecting their...
Date: 03/10/2004