Search Results - exploring buffer overflow

Refine Results
  1. 1

    Delay performance of priority-queue equipped UAV-based mobile relay networks: Exploring the impact of trajectories by Yang, Hailiang, Ruby, Rukhsana, Wu, Kaishun

    ISSN: 1389-1286, 1872-7069
    Published: Amsterdam Elsevier B.V 19.06.2022
    “…UAV-based mobile relay communication systems have an important position in future wireless networks, such as Beyond 5G and 6G, which provide ubiquitous network…”
    Get full text
    Journal Article
  2. 2

    Exploring the Interplay of Interference and Queues in Unlicensed Spectrum Bands for UAV Networks by Ghazikor, Masoud, Roach, Keenan, Cheung, Kenny, Hashemi, Morteza

    ISSN: 2576-2303
    Published: IEEE 29.10.2023
    “… To this end, we provide closed-form expressions for packet drop probabilities in the queue due to buffer overflow or large queuing delay, which are expressed in terms of a transmission policy…”
    Get full text
    Conference Proceeding
  3. 3

    Router Buffer Behavior Analysis for Aggregate Traffic Based on Martingale Method by Sun, Hongliang, Chi, Xuefen, Nan, Zhufen

    ISSN: 1089-7798, 1558-2558
    Published: New York IEEE 01.10.2018
    Published in IEEE communications letters (01.10.2018)
    “… Exploring theory and methods to analyze the characteristics of the buffer is an interesting job, especially when aggregate traffic is transmitted…”
    Get full text
    Journal Article
  4. 4

    Goal-oriented dynamic test generation by Do, TheAnh, Khoo, Siau-Cheng, Fong, Alvis Cheuk Ming, Pears, Russel, Quan, Tho Thanh

    ISSN: 0950-5849, 1873-6025
    Published: Amsterdam Elsevier B.V 01.10.2015
    Published in Information and software technology (01.10.2015)
    “…Memory safety errors such as buffer overflow vulnerabilities are one of the most serious classes of security threats…”
    Get full text
    Journal Article
  5. 5

    A Model-Based Approach to Evaluation of the Efficacy of FEC Coding in Combating Network Packet Losses by Xunqi Yu, Modestino, J.W., Kurceren, R., Yee Sin Chan

    ISSN: 1063-6692, 1558-2566
    Published: New York IEEE 01.06.2008
    Published in IEEE/ACM transactions on networking (01.06.2008)
    “…We propose a model-based analytic approach for evaluating the overall efficacy of FEC coding combined with interleaving in combating packet losses in IP…”
    Get full text
    Journal Article
  6. 6

    Exploring the Internals of Fault-Induced Data-Level Vulnerabilities in Cryptographic Libraries by Xu, Guorui, Wu, Qianmei, Zhang, Fan, Zhao, Xinjie, Chen, Yuan, Guo, Shize

    ISSN: 1545-5971, 1941-0018
    Published: Washington IEEE 01.11.2025
    “… buffer overflows, fault executions can introduce subtle potential vulnerabilities that may not…”
    Get full text
    Journal Article
  7. 7

    Exploring the Interplay of Interference and Queues in Unlicensed Spectrum Bands for UAV Networks by Ghazikor, Masoud, Roach, Keenan, Cheung, Kenny, Hashemi, Morteza

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 24.11.2023
    Published in arXiv.org (24.11.2023)
    “… To this end, we provide closed-form expressions for packet drop probabilities in the queue due to buffer overflow or large queuing delay, which are expressed in terms of a transmission policy…”
    Get full text
    Paper
  8. 8

    Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code by McCully, Gary A., Hastings, John D., Xu, Shengjie, Fortier, Adam

    ISSN: 2768-1831
    Published: IEEE 24.04.2025
    “… To detect vulnerabilities such as buffer overflows in compiled code, this research investigates the application of unidirectional transformer-based embeddings, specifically G PT-2…”
    Get full text
    Conference Proceeding
  9. 9

    Software security by McGraw, G.

    ISSN: 1540-7993, 1558-4046
    Published: New York IEEE 01.03.2004
    Published in IEEE security & privacy (01.03.2004)
    “… Software defects with security ramifications, including implementation bugs such as buffer overflows and design flaws such as inconsistent error handling, promise to be with us for years…”
    Get full text
    Magazine Article
  10. 10

    Game of detections: how are security vulnerabilities discovered in the wild? by Hafiz, Munawar, Fang, Ming

    ISSN: 1382-3256, 1573-7616
    Published: New York Springer US 01.10.2016
    “…: buffer overflow, SQL injection, and cross site scripting vulnerabilities. The goal was to understand the methods and tools used during the discovery and whether…”
    Get full text
    Journal Article
  11. 11

    Under-approximating loops in C programs for fast counterexample detection by Kroening, Daniel, Lewis, Matt, Weissenbacher, Georg

    ISSN: 0925-9856, 1572-8102
    Published: New York Springer US 01.08.2015
    Published in Formal methods in system design (01.08.2015)
    “…Many software model checkers only detect counterexamples with deep loops after exploring numerous spurious and increasingly longer counterexamples…”
    Get full text
    Journal Article
  12. 12

    Comparison and Performance Evaluation of Boundary Fill and Flood Fill Algorithm

    ISSN: 2278-3075, 2278-3075
    Published: 04.07.2020
    “… And also shows the how stack affects the performance of the system due to overflow of buffer later on JAVA implementation with queue improves the system performance for large polygon…”
    Get full text
    Journal Article
  13. 13

    A Comprehensive Analysis and Solution of Cyber Attacks using Machine Learning Techniques

    ISSN: 2278-3075, 2278-3075
    Published: 04.07.2020
    “… day’s difference type of attacks occurred for example DOS attack, Probing, R2U, R2L virus, port scans, buffer overflow, CGI Attack and flooding etc…”
    Get full text
    Journal Article
  14. 14

    Multi-Level Multi-Constraint Multi-Priority Fuzzy Sensor Routing (M3L-C-PFSR) by Agarkhed, Jayashree, Kadrolli, Vijayalaxmi, Patil, Siddaram

    ISSN: 2278-3075, 2278-3075
    Published: 30.07.2019
    “… Applying a scheme of multi level fuzzy based efficient buffer management to limit packet loss due to overflow…”
    Get full text
    Journal Article
  15. 15

    Control-Flow Security for Microcontroller-Based Systems by Tan, Xi

    ISBN: 9798382831923
    Published: ProQuest Dissertations & Theses 01.01.2024
    “… These devices predominantly execute software written in low-level programming languages like C, which exposes them to control-flow hijacking attacks, including stack-based buffer overflows…”
    Get full text
    Dissertation
  16. 16

    A Security Perspective on Code Review: The Case of Chromium by di Biase, Marco, Bruntink, Magiel, Bacchelli, Alberto

    ISSN: 2470-6892
    Published: IEEE 01.10.2016
    “… We present a work we conduct aiming to fill that gap by exploring the MCR process in the Chromium open source project…”
    Get full text
    Conference Proceeding
  17. 17

    An extended Hop-by-hop interest shaping mechanism for content-centric networking by Rozhnova, Natalya, Fdida, Serge

    ISSN: 1930-529X
    Published: IEEE 01.12.2014
    Published in Globecom (2003) (01.12.2014)
    “…The evolution of the Internet has triggered a significant activity exploring new architectures among which the concept of Information-Centric-Networks (ICN) has emerged…”
    Get full text
    Conference Proceeding
  18. 18

    Discovering Vulnerabilities in the Wild: An Empirical Study by Fang, Ming

    ISBN: 9798368491905
    Published: ProQuest Dissertations & Theses 01.01.2014
    “…: buffer overflow, SQL injection, and cross site scripting vulnerabilities. The goal was to understand the methods and tools used during the discovery and whether…”
    Get full text
    Dissertation
  19. 19

    Snort 2.0: intrusion detection by Beale, James, Foster, James C, Posluns, Jeffrey

    ISBN: 9781931836746, 1931836744
    Published: Rockland, Mass Syngress 11.05.2003
    “…The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT…”
    Get full text
    eBook
  20. 20

    Hacking for fun and Education: ELearning on Network Security by Ott, Alexander, Sethmann, Richard

    Published: Reading Academic Conferences International Limited 01.07.2010
    “…In a world where security agencies recruit their security experts, a fundamental and affordable education is needed to address these high demands. Security…”
    Get full text
    Conference Proceeding