Search Results - "exploiting buffer overflow"

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

    Source: Knowledge-Based Intelligent Information & Engineering Systems (9783540465379); 2006, p737-744, 8p

  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Source: Foundations of Security. 2007, p123-138. 16p.

  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    Authors: Kosolapov, Y. V.

    Source: Automatic Control & Computer Sciences; 2020, Vol. 54 Issue 7, p573-583, 11p