Search Results - exploring buffer overflow
-
1
Delay performance of priority-queue equipped UAV-based mobile relay networks: Exploring the impact of trajectories
ISSN: 1389-1286, 1872-7069Published: Amsterdam Elsevier B.V 19.06.2022Published in Computer networks (Amsterdam, Netherlands : 1999) (19.06.2022)“…UAV-based mobile relay communication systems have an important position in future wireless networks, such as Beyond 5G and 6G, which provide ubiquitous network…”
Get full text
Journal Article -
2
Exploring the Interplay of Interference and Queues in Unlicensed Spectrum Bands for UAV Networks
ISSN: 2576-2303Published: IEEE 29.10.2023Published in Conference record - Asilomar Conference on Signals, Systems, & Computers (29.10.2023)“… To this end, we provide closed-form expressions for packet drop probabilities in the queue due to buffer overflow or large queuing delay, which are expressed in terms of a transmission policy…”
Get full text
Conference Proceeding -
3
Router Buffer Behavior Analysis for Aggregate Traffic Based on Martingale Method
ISSN: 1089-7798, 1558-2558Published: New York IEEE 01.10.2018Published in IEEE communications letters (01.10.2018)“… Exploring theory and methods to analyze the characteristics of the buffer is an interesting job, especially when aggregate traffic is transmitted…”
Get full text
Journal Article -
4
Goal-oriented dynamic test generation
ISSN: 0950-5849, 1873-6025Published: Amsterdam Elsevier B.V 01.10.2015Published in Information and software technology (01.10.2015)“…Memory safety errors such as buffer overflow vulnerabilities are one of the most serious classes of security threats…”
Get full text
Journal Article -
5
A Model-Based Approach to Evaluation of the Efficacy of FEC Coding in Combating Network Packet Losses
ISSN: 1063-6692, 1558-2566Published: New York IEEE 01.06.2008Published in IEEE/ACM transactions on networking (01.06.2008)“…We propose a model-based analytic approach for evaluating the overall efficacy of FEC coding combined with interleaving in combating packet losses in IP…”
Get full text
Journal Article -
6
Exploring the Internals of Fault-Induced Data-Level Vulnerabilities in Cryptographic Libraries
ISSN: 1545-5971, 1941-0018Published: Washington IEEE 01.11.2025Published in IEEE transactions on dependable and secure computing (01.11.2025)“… buffer overflows, fault executions can introduce subtle potential vulnerabilities that may not…”
Get full text
Journal Article -
7
Exploring the Interplay of Interference and Queues in Unlicensed Spectrum Bands for UAV Networks
ISSN: 2331-8422Published: Ithaca Cornell University Library, arXiv.org 24.11.2023Published in arXiv.org (24.11.2023)“… To this end, we provide closed-form expressions for packet drop probabilities in the queue due to buffer overflow or large queuing delay, which are expressed in terms of a transmission policy…”
Get full text
Paper -
8
Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code
ISSN: 2768-1831Published: IEEE 24.04.2025Published in Proceedings (International Symposium on Digital Forensic and Security. Online) (24.04.2025)“… To detect vulnerabilities such as buffer overflows in compiled code, this research investigates the application of unidirectional transformer-based embeddings, specifically G PT-2…”
Get full text
Conference Proceeding -
9
Software security
ISSN: 1540-7993, 1558-4046Published: New York IEEE 01.03.2004Published in IEEE security & privacy (01.03.2004)“… Software defects with security ramifications, including implementation bugs such as buffer overflows and design flaws such as inconsistent error handling, promise to be with us for years…”
Get full text
Magazine Article -
10
Game of detections: how are security vulnerabilities discovered in the wild?
ISSN: 1382-3256, 1573-7616Published: New York Springer US 01.10.2016Published in Empirical software engineering : an international journal (01.10.2016)“…: buffer overflow, SQL injection, and cross site scripting vulnerabilities. The goal was to understand the methods and tools used during the discovery and whether…”
Get full text
Journal Article -
11
Under-approximating loops in C programs for fast counterexample detection
ISSN: 0925-9856, 1572-8102Published: New York Springer US 01.08.2015Published in Formal methods in system design (01.08.2015)“…Many software model checkers only detect counterexamples with deep loops after exploring numerous spurious and increasingly longer counterexamples…”
Get full text
Journal Article -
12
Comparison and Performance Evaluation of Boundary Fill and Flood Fill Algorithm
ISSN: 2278-3075, 2278-3075Published: 04.07.2020Published in International journal of innovative technology and exploring engineering (04.07.2020)“… And also shows the how stack affects the performance of the system due to overflow of buffer later on JAVA implementation with queue improves the system performance for large polygon…”
Get full text
Journal Article -
13
A Comprehensive Analysis and Solution of Cyber Attacks using Machine Learning Techniques
ISSN: 2278-3075, 2278-3075Published: 04.07.2020Published in International journal of innovative technology and exploring engineering (04.07.2020)“… day’s difference type of attacks occurred for example DOS attack, Probing, R2U, R2L virus, port scans, buffer overflow, CGI Attack and flooding etc…”
Get full text
Journal Article -
14
Multi-Level Multi-Constraint Multi-Priority Fuzzy Sensor Routing (M3L-C-PFSR)
ISSN: 2278-3075, 2278-3075Published: 30.07.2019Published in International journal of innovative technology and exploring engineering (30.07.2019)“… Applying a scheme of multi level fuzzy based efficient buffer management to limit packet loss due to overflow…”
Get full text
Journal Article -
15
Control-Flow Security for Microcontroller-Based Systems
ISBN: 9798382831923Published: ProQuest Dissertations & Theses 01.01.2024“… These devices predominantly execute software written in low-level programming languages like C, which exposes them to control-flow hijacking attacks, including stack-based buffer overflows…”
Get full text
Dissertation -
16
A Security Perspective on Code Review: The Case of Chromium
ISSN: 2470-6892Published: IEEE 01.10.2016Published in Proceedings / IEEE International Working Conference on Source Code Analysis and Manipulation (01.10.2016)“… We present a work we conduct aiming to fill that gap by exploring the MCR process in the Chromium open source project…”
Get full text
Conference Proceeding -
17
An extended Hop-by-hop interest shaping mechanism for content-centric networking
ISSN: 1930-529XPublished: IEEE 01.12.2014Published in Globecom (2003) (01.12.2014)“…The evolution of the Internet has triggered a significant activity exploring new architectures among which the concept of Information-Centric-Networks (ICN) has emerged…”
Get full text
Conference Proceeding -
18
Discovering Vulnerabilities in the Wild: An Empirical Study
ISBN: 9798368491905Published: ProQuest Dissertations & Theses 01.01.2014“…: buffer overflow, SQL injection, and cross site scripting vulnerabilities. The goal was to understand the methods and tools used during the discovery and whether…”
Get full text
Dissertation -
19
Snort 2.0: intrusion detection
ISBN: 9781931836746, 1931836744Published: Rockland, Mass Syngress 11.05.2003“…The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT…”
Get full text
eBook -
20
Hacking for fun and Education: ELearning on Network Security
Published: Reading Academic Conferences International Limited 01.07.2010Published in European Conference on Information Warfare and Security (01.07.2010)“…In a world where security agencies recruit their security experts, a fundamental and affordable education is needed to address these high demands. Security…”
Get full text
Conference Proceeding

