Home
last modified time | relevance | path

Searched full:threats (Results 1 – 25 of 93) sorted by relevance

1234

/external/google-cloud-java/java-webrisk/proto-google-cloud-webrisk-v1/src/main/java/com/google/webrisk/v1/
DSearchHashesResponseOrBuilder.java34 * <code>repeated .google.cloud.webrisk.v1.SearchHashesResponse.ThreatHash threats = 1;</code>
45 * <code>repeated .google.cloud.webrisk.v1.SearchHashesResponse.ThreatHash threats = 1;</code>
56 * <code>repeated .google.cloud.webrisk.v1.SearchHashesResponse.ThreatHash threats = 1;</code>
67 * <code>repeated .google.cloud.webrisk.v1.SearchHashesResponse.ThreatHash threats = 1;</code>
79 * <code>repeated .google.cloud.webrisk.v1.SearchHashesResponse.ThreatHash threats = 1;</code>
DSearchHashesResponse.java1411 * <code>repeated .google.cloud.webrisk.v1.SearchHashesResponse.ThreatHash threats = 1;</code>
1425 * <code>repeated .google.cloud.webrisk.v1.SearchHashesResponse.ThreatHash threats = 1;</code>
1440 * <code>repeated .google.cloud.webrisk.v1.SearchHashesResponse.ThreatHash threats = 1;</code>
1454 * <code>repeated .google.cloud.webrisk.v1.SearchHashesResponse.ThreatHash threats = 1;</code>
1468 * <code>repeated .google.cloud.webrisk.v1.SearchHashesResponse.ThreatHash threats = 1;</code>
1971 * <code>repeated .google.cloud.webrisk.v1.SearchHashesResponse.ThreatHash threats = 1;</code>
1988 * <code>repeated .google.cloud.webrisk.v1.SearchHashesResponse.ThreatHash threats = 1;</code>
2005 * <code>repeated .google.cloud.webrisk.v1.SearchHashesResponse.ThreatHash threats = 1;</code>
2022 * <code>repeated .google.cloud.webrisk.v1.SearchHashesResponse.ThreatHash threats = 1;</code>
2046 * <code>repeated .google.cloud.webrisk.v1.SearchHashesResponse.ThreatHash threats = 1;</code>
[all …]
/external/google-cloud-java/java-webrisk/proto-google-cloud-webrisk-v1beta1/src/main/java/com/google/webrisk/v1beta1/
DSearchHashesResponseOrBuilder.java34 * <code>repeated .google.cloud.webrisk.v1beta1.SearchHashesResponse.ThreatHash threats = 1;
46 * <code>repeated .google.cloud.webrisk.v1beta1.SearchHashesResponse.ThreatHash threats = 1;
58 * <code>repeated .google.cloud.webrisk.v1beta1.SearchHashesResponse.ThreatHash threats = 1;
70 * <code>repeated .google.cloud.webrisk.v1beta1.SearchHashesResponse.ThreatHash threats = 1;
83 * <code>repeated .google.cloud.webrisk.v1beta1.SearchHashesResponse.ThreatHash threats = 1;
DSearchHashesResponse.java1415 * <code>repeated .google.cloud.webrisk.v1beta1.SearchHashesResponse.ThreatHash threats = 1;
1431 * <code>repeated .google.cloud.webrisk.v1beta1.SearchHashesResponse.ThreatHash threats = 1;
1448 * <code>repeated .google.cloud.webrisk.v1beta1.SearchHashesResponse.ThreatHash threats = 1;
1463 * <code>repeated .google.cloud.webrisk.v1beta1.SearchHashesResponse.ThreatHash threats = 1;
1478 * <code>repeated .google.cloud.webrisk.v1beta1.SearchHashesResponse.ThreatHash threats = 1;
1984 * <code>repeated .google.cloud.webrisk.v1beta1.SearchHashesResponse.ThreatHash threats = 1;
2003 * <code>repeated .google.cloud.webrisk.v1beta1.SearchHashesResponse.ThreatHash threats = 1;
2021 * <code>repeated .google.cloud.webrisk.v1beta1.SearchHashesResponse.ThreatHash threats = 1;
2039 * <code>repeated .google.cloud.webrisk.v1beta1.SearchHashesResponse.ThreatHash threats = 1;
2064 * <code>repeated .google.cloud.webrisk.v1beta1.SearchHashesResponse.ThreatHash threats = 1;
[all …]
/external/trusty/arm-trusted-firmware/docs/threat_model/firmware_threat_model/
Dthreat_model_arm_cca.rst76 which need more time to stabilize. Thus, we do not consider threats that may
120 In this threat model, we use the same method to analyse threats as in the
128 - At this time we only consider the ``Server`` target environment. New threats
135 General Threats for All Firmware Images
138 The following table analyses the :ref:`General Threats` in the context of this
173 Threats to be Mitigated by the Boot Firmware
176 The following table analyses the :ref:`Boot Firmware Threats` in the context of
195 Threats to be Mitigated by the Runtime EL3 Firmware
198 The following table analyses the :ref:`Runtime Firmware Threats` in the context
Dthreat_model_fw_update_and_recovery.rst32 Threats to be Mitigated by the Boot Firmware
35 The following table analyses the :ref:`Boot Firmware Threats` in the context
53 Threats to be mitigated by platform design
81 Threats to be Mitigated by the Boot Firmware
84 The following table analyses the :ref:`Boot Firmware Threats` in the context
Dthreat_model_fvp_r.rst23 currently limited to BL1 only. Any threats from the general TF-A threat model
38 - Any threats regarding NS operation are not relevant.
63 The following threats from that document are still relevant to the fvp_r
Dindex.rst23 data flow diagram, as well as a list of threats we have identified using the
41 …: https://docs.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-threats#stride-model
Dthreat_model.rst33 - There is no Secure-EL2. We don't consider threats that may come with
42 - No experimental features are enabled. We do not consider threats that may come
101 In this section we identify and provide assessment of potential threats to TF-A
102 firmware. The threats are identified for each diagram element on the
168 analysis side-channel attacks represent a category of security threats that
178 In this threat model we categorize threats using the `STRIDE threat
233 | | threats. | |
236 Aggregate risk scores are assigned to identified threats;
270 The following threats were identified by applying STRIDE analysis on
277 to be platform-independent and it is important to keep in mind that such threats
[all …]
/external/arm-trusted-firmware/docs/threat_model/
Dindex.rst5 that helps us identify potential threats and mitigations affecting a system.
8 using a data flow diagram. Then we provide a list of threats we have identified
/external/google-cloud-java/java-securitycenter/
D.repo-metadata.json14threats. Identify security misconfigurations in virtual machines, networks, applications, and stor…
DREADME.md88threats. Identify security misconfigurations in virtual machines, networks, applications, and stor…
/external/python/google-api-python-client/googleapiclient/discovery_cache/documents/
Dsafebrowsing.v4.json413 …"Whitelist used when detecting client incident threats. This enum was never launched and should be…
558 "description": "The format of the threats.",
613 …"Whitelist used when detecting client incident threats. This enum was never launched and should be…
829 … "description": "A set of threats that should be added or removed from a client's local database.",
943 …"Whitelist used when detecting client incident threats. This enum was never launched and should be…
1014 …"description": "The information regarding one or more threats that a client submits when checking …
1113 …"Whitelist used when detecting client incident threats. This enum was never launched and should be…
1214 …"Whitelist used when detecting client incident threats. This enum was never launched and should be…
1326 …"Whitelist used when detecting client incident threats. This enum was never launched and should be…
/external/tensorflow/
DCODE_OF_CONDUCT.md50 …sue queue, to more serious instances such as sexist/racist statements or threats of violence, and …
74 …e engaging in harassment), or involves a threat to anyone's safety (e.g. threats of violence), the…
/external/trusty/arm-trusted-firmware/docs/threat_model/
Dindex.rst5 that helps us identify potential threats and mitigations affecting a system.
/external/aws-sdk-java-v2/.changes/2.17.x/
D2.17.213.json15 …"description": "Added Threats field for security findings. Added new resource details for ECS Cont…
/external/python/google-api-python-client/docs/dyn/
Dsafebrowsing_v4.encodedUpdates.html109 { # A set of threats that should be added or removed from a client&#x27;s local database.
140 { # A set of threats that should be added or removed from a client&#x27;s local database.
166 &quot;threatEntryType&quot;: &quot;A String&quot;, # The format of the threats.
Dsafebrowsing_v4.threatListUpdates.html134 { # A set of threats that should be added or removed from a client&#x27;s local database.
165 { # A set of threats that should be added or removed from a client&#x27;s local database.
191 &quot;threatEntryType&quot;: &quot;A String&quot;, # The format of the threats.
/external/bazelbuild-rules_rust/test/unit/consistent_crate_name/
Dwith_modified_crate_name.bzl1 """A custom rule that threats all its dependencies as direct dependencies."""
/external/rust/android-crates-io/crates/miette/
DCODE_OF_CONDUCT.md37 * Public or private harassment, deliberate intimidation, or threats.
85 …the health and well-being of members of the community. These include any threats, serious physical…
/external/rust/android-crates-io/crates/minimal-lexical/
DCODE_OF_CONDUCT.md37 * Public or private harassment, deliberate intimidation, or threats.
82 …the health and well-being of members of the community. These include any threats, serious physical…
/external/bazelbuild-rules_rust/test/unit/force_all_deps_direct/
Dgenerator.bzl1 """A custom rule that threats all its dependencies as direct dependencies."""
/external/giflib/
Dhistory.adoc31 threats became serious in 1999, with Unisys demanding license fees
/external/tensorflow/tensorflow/compiler/xla/mlir_hlo/stablehlo/
DCODE_OF_CONDUCT.md81 harassment or threats to anyone's safety, we may take action without notice.
/external/deqp-deps/amber/
DCODE_OF_CONDUCT.md87 harassment or threats to anyone's safety, we may take action without notice.

1234