-
1
-
2
Preface to special issue on miscellaneous emerging security problems
Published 2015-10-01Subjects: Get full text
Article -
3
Collecting Vulnerable Source Code from Open-Source Repositories for Dataset Generation
Published 2020-02-01Subjects: Get full text
Article -
4
SSRC:source rate control algorithm for delay-sensitive flow in data center network
Published 2019-07-01Subjects: “…delay-sensitive;long flow;software-defined network;buffer overflow…”
Get full text
Article -
5
SSRC:source rate control algorithm for delay-sensitive flow in data center network
Published 2019-07-01Subjects: Get full text
Article -
6
Use of Ensemble Learning to Detect Buffer Overflow Exploitation
Published 2023-01-01Subjects: “…Buffer overflow…”
Get full text
Article -
7
Cooperative mobile data collection in smart cities
Published 2020-01-01Subjects: Get full text
Article -
8
Vulnerabilities of Software for Mobile Phones and Secure Programming Techniques
Published 2012-09-01Subjects: Get full text
Article -
9
An In-Depth Survey of Bypassing Buffer Overflow Mitigation Techniques
Published 2022-07-01Subjects: “…buffer overflow attacks…”
Get full text
Article -
10
ASNM Datasets: A Collection of Network Attacks for Testing of Adversarial Classifiers and Intrusion Detectors
Published 2020-01-01Subjects: Get full text
Article -
11
Stacy-static code analysis for enhanced vulnerability detection
Published 2017-01-01Subjects: Get full text
Article -
12
A Security Design for the Detecting of Buffer Overflow Attacks in IoT Device
Published 2018-01-01Subjects: Get full text
Article -
13
Communication-Traffic-Assisted Mining and Exploitation of Buffer Overflow Vulnerabilities in ADASs
Published 2023-05-01Subjects: Get full text
Article -
14
A Proposed Adaptive Bitrate Scheme Based on Bandwidth Prediction Algorithm for Smoothly Video Streaming
Published 2021-01-01Subjects: “…Video streaming, video buffer, overflow state, underflow state, adaptive bitrate algorithm.…”
Get full text
Article -
15
Failure-Oblivious Computing and Boundless Memory Blocks
Published 2005Subjects: Get full text
Article -
16
Through the Window: Exploitation and Countermeasures of the ESP32 Register Window Overflow
Published 2023-06-01Subjects: Get full text
Article -
17
On the Time to Buffer Overflow in a Queueing Model with a General Independent Input Stream and Power-Saving Mechanism Based on Working Vacations
Published 2021-08-01Subjects: Get full text
Article -
18
A buffer overflow detection and defense method based on RISC-V instruction set extension
Published 2023-09-01Subjects: Get full text
Article -
19
DTN Architecture With Resource-Aware Rate Adaptation for Multiple Bundle Transmission in InterPlanetary Networks
Published 2022-01-01Subjects: Get full text
Article -
20
Probabilistic Analysis of a Buffer Overflow Duration in Data Transmission in Wireless Sensor Networks
Published 2020-10-01Subjects: “…buffer overflow…”
Get full text
Article