Výsledky vyhľadávania - (("exploiting buffer overflow") OR ("exploring buffer overflow"))
-
1
Autori:
Zdroj: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). :1921-1927
Predmety: 0103 physical sciences, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, 01 natural sciences
-
2
Autori:
Zdroj: ACM SIGCSE Bulletin. 35:172-176
Predmety: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
Prístupová URL adresa: http://portal.acm.org/citation.cfm?doid=611892.611962
https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.15.6998&rep=rep1&type=pdf
https://dblp.uni-trier.de/db/conf/sigcse/sigcse2003.html#PhillipsT03
http://guimli.free.fr/download/Exploring %20Security%20Vulnerabilities%20by%20Exploiting%20Buffer%20Overflow.pdf
https://doi.org/10.1145/611892.611962
http://www.cs.uwec.edu/~tan/sigcse03.pdf -
3
Autori:
Zdroj: Proceedings of the 34th SIGCSE technical symposium on Computer science education - SIGCSE '03
-
4
Autori:
Zdroj: Procedia Computer Science. 2019, Vol. 160, p9-14. 6p.
-
5
Prispievatelia: The Pennsylvania State University CiteSeerX Archives
Predmety: Pedagogy, Buffer Overflow
Popis súboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.82.1023; http://www.cs.uwec.edu/~phillips/papers/bufferOverflow.pdf
-
6
Autori: a ďalší
Prispievatelia: a ďalší
Predmety: Pedagogy, Buffer Overflow
Popis súboru: application/postscript
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.6998; http://www.cs.uwec.edu/~phillips/papers/bufferOverflow.ps.gz
-
7
Autori: a ďalší
Zdroj: Electronics (2079-9292); Dec2023, Vol. 12 Issue 23, p4741, 15p
Predmety: PETRI nets, COMPUTER security vulnerabilities
-
8
Autori: a ďalší
Zdroj: Future Internet; May2023, Vol. 15 Issue 5, p185, 16p
Predmety: DRIVER assistance systems
-
9
Autori: a ďalší
Zdroj: IET Software (Wiley-Blackwell); Oct2022, Vol. 16 Issue 5, p527-541, 15p
-
10
Autori: a ďalší
Zdroj: Knowledge-Based Intelligent Information & Engineering Systems (9783540465379); 2006, p737-744, 8p
-
11
Autori: a ďalší
Zdroj: Applied Sciences (2076-3417); Jul2022, Vol. 12 Issue 13, pN.PAG-N.PAG, 31p
-
12
Autori: a ďalší
Zdroj: IEEE/ACM Transactions on Networking; Feb2010, Vol. 18 Issue 1, p53-66, 14p
-
13
Autori:
Zdroj: Applied Sciences (2076-3417); Feb2022, Vol. 12 Issue 3, p1598, 19p
-
14
Autori: Jones, David
Zdroj: Cybersecurity Dive; 2/13/2025, pN.PAG-N.PAG, 1p
Predmety: DATA corruption, COMPUTER security vulnerabilities, COMPUTER software development, SOFTWARE architecture, DESIGN software
-
15
-
16
-
17
Autori: Kosolapov, Y. V.
Zdroj: Automatic Control & Computer Sciences; 2020, Vol. 54 Issue 7, p573-583, 11p
-
18
Autori:
Zdroj: Database Systems Journal; 2020, Vol. 11 Issue 3, p99-108, 10p
-
19
Autori:
Zdroj: Cybersecurity (2523-3246); 1/14/2020, Vol. 3 Issue 1, p1-12, 12p
-
20
Autori:
Zdroj: Software: Practice & Experience; 4/25/2003, Vol. 33 Issue 5, p423, 38p
Nájsť tento článok vo Web of Science
Full Text Finder