Showing 1 - 14 results of 14 for search 'Hector Marco-Gisbert', query time: 0.04s
Refine Results
-
1
Proof of Adjourn (PoAj): A Novel Approach to Mitigate Blockchain Attacks by Sarwar Sayeed, Hector Marco-Gisbert
Published 2020-09-01
Article -
2
Assessing Blockchain Consensus and Security Mechanisms against the 51% Attack by Sarwar Sayeed, Hector Marco-Gisbert
Published 2019-04-01
Article -
3
Address Space Layout Randomization Next Generation by Hector Marco-Gisbert, Ismael Ripoll Ripoll
Published 2019-07-01
Article -
4
An Info-Leak Resistant Kernel Randomization for Virtualized Systems by Fernando Vano-Garcia, Hector Marco-Gisbert
Published 2020-01-01
Article -
5
E-BOOT: Preventing Boot-Time Entropy Starvation in Cloud Systems by Fernando Vano-Garcia, Hector Marco-Gisbert
Published 2020-01-01
Article -
6
A Review of Memory Errors Exploitation in x86-64 by Conor Pirry, Hector Marco-Gisbert, Carolyn Begg
Published 2020-06-01
Article -
7
Mitigating Webshell Attacks through Machine Learning Techniques by You Guo, Hector Marco-Gisbert, Paul Keir
Published 2020-01-01
Article -
8
Smart Contract: Attacks and Protections by Sarwar Sayeed, Hector Marco-Gisbert, Tom Caira
Published 2020-01-01
Article -
9
Control-Flow Integrity: Attacks and Protections by Sarwar Sayeed, Hector Marco-Gisbert, Ismael Ripoll, Miriam Birch
Published 2019-10-01
Article -
10
From Intelligence gathering to Cyber Threat Detection by Antonio VILLALON-HUERTA, Ismael RIPOLL-RIPOLL, Héctor MARCO-GISBERT
Published 2023-06-01
Article -
11
SOC Critical Path: A Defensive Kill Chain Model by Antonio Villalon-Huerta, Hector Marco Gisbert, Ismael Ripoll-Ripoll
Published 2022-01-01
Article -
12
-
13
CNA Tactics and Techniques: A Structure Proposal by Antonio Villalón-Huerta, Ismael Ripoll-Ripoll, Hector Marco-Gisbert
Published 2021-02-01
Article -
14
A Taxonomy for Threat Actors’ Delivery Techniques by Antonio Villalón-Huerta, Ismael Ripoll-Ripoll, Hector Marco-Gisbert
Published 2022-04-01
Article