Search Results - "buffer overflow attacks"
-
1
Authors: et al.
Source: Applied Sciences, Vol 12, Iss 6702, p 6702 (2022)
Subject Terms: buffer overflow attacks, CVE, mitigation techniques, hardware based mitigation approaches, Technology, Engineering (General). Civil engineering (General), TA1-2040, Biology (General), QH301-705.5, Physics, QC1-999, Chemistry, QD1-999
Relation: https://www.mdpi.com/2076-3417/12/13/6702; https://doaj.org/toc/2076-3417; https://doaj.org/article/bd22c53f218042d2b8ac200175422081
-
2
Authors:
Contributors:
Source: 2014 International Wireless Communications and Mobile Computing Conference (IWCMC). :24-29
Subject Terms: Probing attacks, Buffer Overflow attacks, 2. Zero hunger, KDD99 Dataset, [INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI], NIDS, 0202 electrical engineering, electronic engineering, information engineering, C4.5 Decision Trees, 02 engineering and technology, DDoS, Clustering, Unsupervised Machine Learning
File Description: application/pdf
Access URL: https://hal.archives-ouvertes.fr/hal-00945592/file/1569906451.pdf
https://hal.archives-ouvertes.fr/hal-00945592/document
https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=201902207058355430
https://dblp.uni-trier.de/db/conf/iwcmc/iwcmc2014.html#CasasMO14
https://hal.archives-ouvertes.fr/hal-00945592
https://hal.science/hal-00945592v1 -
3
Authors: Rinard, Martin C.
Subject Terms: Memory Errors, Buffer Overflow Attacks, Failure-Oblivious Computing, Acceptability-Oriented Computing
File Description: 43489 bytes; application/pdf
Relation: Computer Science (CS)
Availability: http://hdl.handle.net/1721.1/7505
-
4
Authors:
Source: HotWiSec 2013 - Proceedings of the 2013 ACM Workshop on Hot Topics on Wireless Network Security and Privacy. :7-11
Subject Terms: Exploits, Malicious code injection, Multi-stage buffer overflow attacks, Spyware, Wireless sensor networks
File Description: print
-
5
Authors: Homoliak, Ivan
Thesis Advisors: Chmelař, Petr, Drozd, Michal
Subject Terms: dolovaní dat, malware, škodlivý software, zero day attacks, KDD Cup 99, zero day útoky, IDS, IPS, buffer overflow attacks, data mining, honeypot, buffer overflow útoky
Availability: http://www.nusl.cz/ntk/nusl-236525
-
6
Authors: et al.
Contributors: et al.
Source: DTIC
Subject Terms: Computer Programming and Software, Computer Systems, Computer Systems Management and Standards, SCANNING, EMBEDDING, COMPUTER NETWORKS, ANTIVIRUS SOFTWARE, APPLICATION PROGRAMMING INTERFACE, FIREWALLS(COMPUTERS), INTRUSION DETECTION(COMPUTERS), SOFTWARE ENGINEERING, ELECTRONIC MAIL, DATA TRANSMISSION SECURITY, COMPUTER VIRUSES, PACKET SWITCHING, PERFORMANCE(ENGINEERING), PROTOTYPES, CODING, SELF-SECURING NETWORK INTERFACES, SOFTWARE ARCHITECTURE, ANTI-WORM SOFTWARE, NETWORK SECURITY, CODE RED WORMS, NIC(NETWORK INTERFACE CARD), E-MAIL VIRUSES, BUFFER OVERFLOW ATTACKS, SYN BOMBS, SUSPICIOUS NETWORK ACTIVITIES, CYBERATTACKS, NETWORK INTERFACE KERNALS
Availability: http://www.dtic.mil/docs/citations/ADA457627
-
7
Authors:
Contributors:
Source: DTIC AND NTIS
Subject Terms: Statistics and Probability, Computer Programming and Software, Computer Systems Management and Standards, MATHEMATICAL MODELS, ATTACK, CLASSIFICATION, INTRUSION DETECTION(COMPUTERS), MARKOV PROCESSES, COMPUTER PROGRAMS, EFFICIENCY, COMPUTER NETWORKS, THESES, ALGORITHMS, THREATS, NETWORK ATTACKS, ATTACK MODELING, HIDDEN MARKOV MODELS, U2R ATTACKS, R2U ATTACKS, BUFFER OVERFLOW ATTACKS, geo, info
Availability: http://www.dtic.mil/docs/citations/ADA438667
-
8
Authors: et al.
Contributors: et al.
Subject Terms: Buffer Overflow Attacks, Network Security, Self Reconfiguration, Failure-Oblivious Computing, Guard Pages, envir, geo
Relation: http://hdl.handle.net/11536/15873
Availability: http://hdl.handle.net/11536/15873
-
9
Authors:
Contributors:
Subject Terms: Management, Reliability, Security, Theory Keywords Buffer overflow, Buffer-Overflow Attacks, Computer security, Intrusion Detection, Intrusion Prevention
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.8660; http://www.ece.wisc.edu/~wddd/2006/papers/wddd_07.pdf
-
10
Authors:
Contributors:
Subject Terms: Key Words, Memory Errors, Buffer Overflow Attacks, Failure- Oblivious Computing, Acceptability-Oriented Computing
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.93.9762; http://dspace.mit.edu/bitstream/1721.1/7505/1/CS007a.pdf
-
11
Authors:
Contributors:
Subject Terms: Unsupervised Machine Learning, Clustering, C4.5 Decision Trees, DDoS, Buffer Overflow attacks, Probing attacks, KDD99 Dataset
File Description: application/pdf
-
12
Authors:
Contributors:
Subject Terms: Buffer-Overflow Attacks, Function-Pointer Attacks, Intrusion Detection, Intrusion Prevention
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.503.4979; http://www.cse.msu.edu/~cse825/SBit2.pdf
-
13
Authors: et al.
Contributors: et al.
Subject Terms: Buffer Overflow Attacks, Network Security, Self Reconfiguration, Failure-Oblivious Computing, Guard Pages
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.475.5600; http://www.sis.pitt.edu/jjoshi/courses/IS2620/Spring11/Paper4.pdf
-
14
Authors: Wilson, Gregory V. gvwilson@ddj.com
Source: Dr. Dobb's Journal: Software Tools for the Professional Programmer. Sep2005, Vol. 30 Issue 9, p85-85. 1p.
Subject Terms: NONFICTION
-
15
Authors:
Contributors:
Subject Terms: buffer overflow útoky, zero day útoky, síťové útoky, IDS, UDP, honeypot, škodlivý software, síťová bezpečnost, buffer overflow attacks, zero day attacks, network attacks, malware, network security
File Description: application/pdf; text/html
Relation: 88609; http://hdl.handle.net/11012/52416
Availability: http://hdl.handle.net/11012/52416
-
16
Authors:
Contributors:
Subject Terms: honeypot, IPS, IDS, KDD Cup 99, škodlivý software, zero day útoky, buffer overflow útoky, dolovaní dat, malware, zero day attacks, buffer overflow attacks, data mining
File Description: application/pdf; text/html
Relation: HOMOLIAK, I. Metriky pro detekci útoků v síťovém provozu [online]. Brno: Vysoké učení technické v Brně. Fakulta informačních technologií. 2012.; 78963; http://hdl.handle.net/11012/53668
Availability: http://hdl.handle.net/11012/53668
-
17
Authors: et al.
Contributors: et al.
Subject Terms: 緩衝區溢位攻擊, 堆疊覆寫, 軟體安全, 動態執行檔轉譯, Pin, QEMU, buffer overflow attacks, stack smashing, software security, dynamic binary translation
File Description: application/pdf; 1380352 bytes
-
18
Authors: Homoliak, Ivan
Thesis Advisors: Čeleda, Pavel, Ochoa,, Martín, Hanáček, Petr
Subject Terms: tunneling obfuscations, Network behavioral anomaly detection, non-payload-based obfuscations, tunelovací obfuskace, strojové učení s učitelem, obfuskace modifikující síťové charakteristiky, supervised machine learning, buffer overflow attacks, Behaviorální analýza síťových anomálií, buffer overflow útoky
Availability: http://www.nusl.cz/ntk/nusl-261231
-
19
Authors:
Contributors:
Subject Terms: zero day attacks, malware, IPS, škodlivý software, buffer overflow attacks, dolovaní dat, data mining, IDS, zero day útoky, buffer overflow útoky, KDD Cup 99, honeypot
File Description: application/pdf; text/html
Access URL: http://hdl.handle.net/11012/53668
-
20
Authors: et al.
Contributors: et al.
Subject Terms: tunelovací obfuskace, tunneling obfuscations, Behaviorální analýza síťových anomálií, buffer overflow attacks, strojové učení s učitelem, supervised machine learning, obfuskace modifikující síťové charakteristiky, buffer overflow útoky, Network behavioral anomaly detection, non-payload-based obfuscations
File Description: application/pdf; text/html
Access URL: http://hdl.handle.net/11012/63234
Nájsť tento článok vo Web of Science
Full Text Finder