Search Results - (("exploiting buffer overflow") OR ("exploring buffer overflow"))*
-
1
Authors:
Source: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). :1921-1927
Subject Terms: 0103 physical sciences, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, 01 natural sciences
-
2
Authors:
Source: ACM SIGCSE Bulletin. 35:172-176
Subject Terms: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
Access URL: http://portal.acm.org/citation.cfm?doid=611892.611962
https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.15.6998&rep=rep1&type=pdf
https://dblp.uni-trier.de/db/conf/sigcse/sigcse2003.html#PhillipsT03
http://guimli.free.fr/download/Exploring %20Security%20Vulnerabilities%20by%20Exploiting%20Buffer%20Overflow.pdf
https://doi.org/10.1145/611892.611962
http://www.cs.uwec.edu/~tan/sigcse03.pdf -
3
Authors:
Source: Proceedings of the 34th SIGCSE technical symposium on Computer science education - SIGCSE '03
-
4
Authors:
Source: Procedia Computer Science. 2019, Vol. 160, p9-14. 6p.
Subject Terms: Leakage, Design protection, Computer security vulnerabilities, Security systems
-
5
Contributors: The Pennsylvania State University CiteSeerX Archives
Subject Terms: Pedagogy, Buffer Overflow
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.82.1023; http://www.cs.uwec.edu/~phillips/papers/bufferOverflow.pdf
-
6
Authors: et al.
Contributors: et al.
Subject Terms: Pedagogy, Buffer Overflow
File Description: application/postscript
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.6998; http://www.cs.uwec.edu/~phillips/papers/bufferOverflow.ps.gz
-
7
Authors: et al.
Source: Electronics (2079-9292); Dec2023, Vol. 12 Issue 23, p4741, 15p
Subject Terms: PETRI nets, COMPUTER security vulnerabilities
-
8
Authors: et al.
Source: Future Internet; May2023, Vol. 15 Issue 5, p185, 16p
Subject Terms: DRIVER assistance systems
-
9
Authors: et al.
Source: IET Software (Wiley-Blackwell); Oct2022, Vol. 16 Issue 5, p527-541, 15p
Subject Terms: K-means clustering, ALGORITHMS, CLUSTER analysis (Statistics), SOURCE code, MALWARE, DATA analysis
-
10
Authors: et al.
Source: Knowledge-Based Intelligent Information & Engineering Systems (9783540465379); 2006, p737-744, 8p
-
11
Authors: et al.
Source: Applied Sciences (2076-3417); Jul2022, Vol. 12 Issue 13, pN.PAG-N.PAG, 31p
Subject Terms: APPLICATION software, COMPILERS (Computer programs), SYSTEMS software, AUTHORSHIP
-
12
Authors: et al.
Source: IEEE/ACM Transactions on Networking; Feb2010, Vol. 18 Issue 1, p53-66, 14p
-
13
Authors:
Source: Applied Sciences (2076-3417); Feb2022, Vol. 12 Issue 3, p1598, 19p
-
14
Authors: Jones, David
Source: Cybersecurity Dive; 2/13/2025, pN.PAG-N.PAG, 1p
Subject Terms: DATA corruption, COMPUTER security vulnerabilities, COMPUTER software development, SOFTWARE architecture, DESIGN software
-
15
Authors: Jason Deckard
Resource Type: eBook.
Subjects: Computer viruses, Computer security
-
16
-
17
Authors: Kosolapov, Y. V.
Source: Automatic Control & Computer Sciences; 2020, Vol. 54 Issue 7, p573-583, 11p
-
18
Authors:
Source: Database Systems Journal; 2020, Vol. 11 Issue 3, p99-108, 10p
Subject Terms: COMBINED sewer overflows, DESIGN protection, SECURITY systems
-
19
Authors:
Source: Cybersecurity (2523-3246); 1/14/2020, Vol. 3 Issue 1, p1-12, 12p
Subject Terms: ROOTKITS (Computer software), BOTNETS, ANTIVIRUS software, DATA security, CYBERTERRORISM
-
20
Authors:
Source: Software: Practice & Experience; 4/25/2003, Vol. 33 Issue 5, p423, 38p
Nájsť tento článok vo Web of Science
Full Text Finder