Search Results - "buffer overflow"

Refine Results
  1. 1

    Enhancing Reliability in LEO Satellite Networks via High-Speed Inter-Satellite Links by Choi, Jinho

    ISSN: 2162-2337, 2162-2345
    Published: Piscataway IEEE 01.08.2024
    Published in IEEE wireless communications letters (01.08.2024)
    “…Low Earth orbit (LEO) satellites play a crucial role in providing global connectivity for non-terrestrial networks (NTNs) and supporting various…”
    Get full text
    Journal Article
  2. 2

    On Buffer-Constrained Throughput of a Wireless-Powered Communication System by Li, Zhidu, Jiang, Yuming, Gao, Yuehong, Sang, Lin, Yang, Dacheng

    ISSN: 0733-8716, 1558-0008
    Published: New York IEEE 01.02.2019
    “…In this paper, the buffer-constrained throughput performance of a multi-user wireless-powered communication (WPC) system is investigated, where energy…”
    Get full text
    Journal Article
  3. 3

    TEDVIL: Leveraging Transformer-Based Embeddings for Vulnerability Detection in Lifted Code by McCully, Gary A., Hastings, John D., Xu, Shengjie

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 01.01.2025
    Published in IEEE access (01.01.2025)
    “…Ransomware and other malware inflict devastating financial and operational damage on organizations worldwide by exploiting deeply embedded, hard-to-detect…”
    Get full text
    Journal Article
  4. 4

    On the structure of data losses induced by an overflowed buffer by Chydzinski, Andrzej

    ISSN: 0096-3003
    Published: Elsevier Inc 15.02.2022
    Published in Applied mathematics and computation (15.02.2022)
    “…•The autocorrelation of the interarrival times of a stream of packets has a deep impact on the structure of losses induced by an overflowed buffer.•The burst…”
    Get full text
    Journal Article
  5. 5

    Queue-Aware Access Prioritization for Massive Machine-Type Communication by Chowdhury, Mayukh Roy, De, Swades

    ISSN: 2327-4662, 2327-4662
    Published: Piscataway IEEE 01.09.2022
    Published in IEEE internet of things journal (01.09.2022)
    “…One of the pivotal services of the fifth generation (5G) of cellular technology is massive Machine-type Communications (mMTCs), which is intended to support…”
    Get full text
    Journal Article
  6. 6

    Raptor codes by Shokrollahi, A.

    ISSN: 0018-9448, 1063-6692, 1557-9654, 1558-2566
    Published: New York IEEE 01.06.2006
    Published in IEEE transactions on information theory (01.06.2006)
    “…LT-codes are a new class of codes introduced by Luby for the purpose of scalable and fault-tolerant distribution of data over computer networks. In this paper,…”
    Get full text
    Journal Article
  7. 7

    Superframe Duration Allocation Schemes to Improve the Throughput of Cluster-Tree Wireless Sensor Networks by Leão, Erico, Montez, Carlos, Moraes, Ricardo, Portugal, Paulo, Vasques, Francisco

    ISSN: 1424-8220, 1424-8220
    Published: Switzerland MDPI AG 27.01.2017
    Published in Sensors (Basel, Switzerland) (27.01.2017)
    “…The use of Wireless Sensor Network (WSN) technologies is an attractive option to support wide-scale monitoring applications, such as the ones that can be found…”
    Get full text
    Journal Article
  8. 8

    A multitype software buffer overflow vulnerability prediction method based on a software graph structure and a self-attentive graph neural network by Zheng, Zhangqi, Liu, Yongshan, Zhang, Bing, Liu, Xinqian, He, Hongyan, Gong, Xiang

    ISSN: 0950-5849, 1873-6025
    Published: Elsevier B.V 01.08.2023
    Published in Information and software technology (01.08.2023)
    “…•A method for predicting buffer overflow vulnerabilities in multiple types of software is proposed.•A software vulnerability feature set called GSVFset is…”
    Get full text
    Journal Article
  9. 9

    Exploiting stack-based buffer overflow using modern day techniques by Nicula, Ștefan, Zota, Răzvan Daniel

    ISSN: 1877-0509, 1877-0509
    Published: Elsevier B.V 2019
    Published in Procedia computer science (2019)
    “…One of the most commonly known vulnerabilities that can affect a binary executable is the stack-based buffer overflow. The buffer overflow occurs when a…”
    Get full text
    Journal Article
  10. 10

    Buffer-loss estimation to address congestion in 6LoWPAN based resource-restricted ‘Internet of Healthcare Things’ network by Verma, Himanshu, Chauhan, Naveen, Chand, Narottam, Awasthi, Lalit Kumar

    ISSN: 0140-3664, 1873-703X
    Published: Elsevier B.V 01.01.2022
    Published in Computer communications (01.01.2022)
    “…The Internet of Healthcare Things (IoHT) consists of a wide variety of resource-restricted, heterogeneous, IoT-enabled, wearable/non-wearable medical equipment…”
    Get full text
    Journal Article
  11. 11

    A Security Design for the Detecting of Buffer Overflow Attacks in IoT Device by Xu, Bin, Wang, Weike, Hao, Qiang, Zhang, Zhun, Du, Pei, Xia, Tongsheng, Li, Hongge, Wang, Xiang

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 2018
    Published in IEEE access (2018)
    “…At present, the IoT devices face many kinds of software and hardware attacks, especially buffer overflow attacks. This paper presents an architectural-enhanced…”
    Get full text
    Journal Article
  12. 12

    Static detection of real-world buffer overflow induced by loop by Luo, Peng, Zou, Deqing, Du, Yajuan, Jin, Hai, Liu, Changming, Shen, Jinan

    ISSN: 0167-4048, 1872-6208
    Published: Amsterdam Elsevier Ltd 01.02.2020
    Published in Computers & security (01.02.2020)
    “…Buffer overflow (BoF) is one of the most dangerous security vulnerabilities. A BoF can be induced by functions, such as the memcpy family, or loops with…”
    Get full text
    Journal Article
  13. 13

    Loss Clustering at MSP Buffer by Chydzinski, Andrzej, Adamczyk, Blazej

    ISSN: 2224-2708, 2224-2708
    Published: Basel MDPI AG 01.08.2025
    Published in Journal of sensor and actuator networks (01.08.2025)
    “…Packet losses cause a decline in the performance of packet networks, and this decline is related not only to the percentage of losses but also to the…”
    Get full text
    Journal Article
  14. 14

    Sticky Tags: Efficient and Deterministic Spatial Memory Error Mitigation using Persistent Memory Tags by Gorter, Floris, Kroes, Taddeus, Bos, Herbert, Giuffrida, Cristiano

    ISSN: 2375-1207
    Published: IEEE 19.05.2024
    “…Spatial memory errors such as buffer overflows still rank among the top vulnerabilities in C/C++ programs. Despite much research in the area, the performance…”
    Get full text
    Conference Proceeding
  15. 15

    Priority based data gathering using multiple mobile sinks in cluster based UWSNs for oil pipeline leakage detection by Goyal, Nitin, Kumar, Ashok, Popli, Renu, Awasthi, Lalit Kumar, Sharma, Nonita, Sharma, Gaurav

    ISSN: 1386-7857, 1573-7543
    Published: New York Springer US 01.04.2022
    Published in Cluster computing (01.04.2022)
    “…Energy efficient and completely reliable data gathering in resource constrained sparse Underwater Wireless Sensor Networks (UWSNs) is challenging and requires…”
    Get full text
    Journal Article
  16. 16

    Distribution of the time to buffer overflow in the M/G/1/N-type queueing model with batch arrivals and multiple vacation policy by Kempa, Wojciech M., Marjasz, Rafał

    ISSN: 0160-5682, 1476-9360
    Published: Taylor & Francis 03.03.2020
    “…A single-channel FIFO queueing model with finite buffer capacity and the multiple vacation policy is investigated, in which jobs arrive according to a compound…”
    Get full text
    Journal Article
  17. 17

    Explicit Load Balancing Technique for NGEO Satellite IP Networks With On-Board Processing Capabilities by Taleb, T., Mashimo, D., Jamalipour, A., Kato, N., Nemoto, Y.

    ISSN: 1063-6692, 1558-2566
    Published: New York IEEE 01.02.2009
    Published in IEEE/ACM transactions on networking (01.02.2009)
    “…Non-geostationary (NGEO) satellite communication systems offer an array of advantages over their terrestrial and geostationary counterparts. They are seen as…”
    Get full text
    Journal Article
  18. 18

    Power Control for Wireless VBR Video Streaming: From Optimization to Reinforcement Learning by Ye, Chuang, Gursoy, M. Cenk, Velipasalar, Senem

    ISSN: 0090-6778, 1558-0857
    Published: New York IEEE 01.08.2019
    Published in IEEE transactions on communications (01.08.2019)
    “…In this paper, we investigate the problem of power control for streaming variable bit rate (VBR) videos over wireless links. A system model involving a…”
    Get full text
    Journal Article
  19. 19

    On the Time to Buffer Overflow in a Queueing Model with a General Independent Input Stream and Power-Saving Mechanism Based on Working Vacations by Kobielnik, Martyna, Kempa, Wojciech

    ISSN: 1424-8220, 1424-8220
    Published: Basel MDPI AG 16.08.2021
    Published in Sensors (Basel, Switzerland) (16.08.2021)
    “…A single server GI/M/1 queue with a limited buffer and an energy-saving mechanism based on a single working vacation policy is analyzed. The general…”
    Get full text
    Journal Article
  20. 20

    An In-Depth Survey of Bypassing Buffer Overflow Mitigation Techniques by Butt, Muhammad Arif, Ajmal, Zarafshan, Khan, Zafar Iqbal, Idrees, Muhammad, Javed, Yasir

    ISSN: 2076-3417, 2076-3417
    Published: Basel MDPI AG 01.07.2022
    Published in Applied sciences (01.07.2022)
    “…Buffer Overflow (BOF) has been a ubiquitous security vulnerability for more than three decades, potentially compromising any software application or system…”
    Get full text
    Journal Article