Erratum to: On the Detection of Exploitation of Vulnerabilities That Leads to the Execution of a Malicious Code
An Erratum to this paper has been published: https://doi.org/10.3103/S0146411622070094
Uložené v:
| Vydané v: | Automatic control and computer sciences Ročník 56; číslo 7; s. 828 |
|---|---|
| Hlavný autor: | |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Moscow
Pleiades Publishing
01.12.2022
Springer Nature B.V |
| Predmet: | |
| ISSN: | 0146-4116, 1558-108X |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | An Erratum to this paper has been published: https://doi.org/10.3103/S0146411622070094 |
|---|---|
| AbstractList | An Erratum to this paper has been published: https://doi.org/10.3103/S0146411622070094 |
| Author | Kosolapov, Y. V. |
| Author_xml | – sequence: 1 givenname: Y. V. orcidid: 0000-0002-1491-524X surname: Kosolapov fullname: Kosolapov, Y. V. email: itaim@mail.ru organization: Southern Federal University |
| BookMark | eNp1kE1LAzEQhoNUsK3-AG8Bz6vJ5mOz3qTWD6j0YBVvy2w2a1O2m5pkof57t9biQTwNw_s878CM0KB1rUHonJJLRgm7eiaUS06pTFOSEZLzIzSkQqiEEvU2QMNdnOzyEzQKYUVInyk5RG7qPcRujaO7xvMWx6XBtyYaHa1rsavxdLtpnI1w2F-7pjUeStvYaE3AiyVEPDNQhb7iW59uje4OOOAnaKy2rgt44ipzio5raII5-5lj9HI3XUwektn8_nFyM0s0FZInUoKSItOEEc1BaM51SfKKs0xJJStGaAoUSCZTJg2oWtYlrQSrRA5lKiBnY3Sx791499GZEIuV63zbnyzSLFOEcy54T9E9pb0LwZu62Hi7Bv9ZUFLs_lr8-WvvpHsn9Gz7bvxv8__SF6x8els |
| ContentType | Journal Article |
| Copyright | Allerton Press, Inc. 2022. ISSN 0146-4116, Automatic Control and Computer Sciences, 2022, Vol. 56, No. 7, p. 828. © Allerton Press, Inc., 2022. Russian Text © The Author(s), 2021, published in Modelirovanie i Analiz Informatsionnykh Sistem, 2021, No. 3, pp. 314–316. |
| Copyright_xml | – notice: Allerton Press, Inc. 2022. ISSN 0146-4116, Automatic Control and Computer Sciences, 2022, Vol. 56, No. 7, p. 828. © Allerton Press, Inc., 2022. Russian Text © The Author(s), 2021, published in Modelirovanie i Analiz Informatsionnykh Sistem, 2021, No. 3, pp. 314–316. |
| DBID | AAYXX CITATION JQ2 |
| DOI | 10.3103/S0146411622070094 |
| DatabaseName | CrossRef ProQuest Computer Science Collection |
| DatabaseTitle | CrossRef ProQuest Computer Science Collection |
| DatabaseTitleList | ProQuest Computer Science Collection |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISSN | 1558-108X |
| EndPage | 828 |
| ExternalDocumentID | 10_3103_S0146411622070094 |
| Genre | Correction/Retraction |
| GroupedDBID | -59 -5G -BR -EM -Y2 -~C -~X .86 .VR 06D 0R~ 0VY 1N0 23N 2J2 2JN 2JY 2KG 2KM 2LR 2VQ 2~H 30V 4.4 408 40D 40E 5GY 5VS 6NX 8TC 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABDZT ABECU ABFTD ABFTV ABHQN ABJNI ABJOX ABKCH ABMNI ABMQK ABNWP ABQBU ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACCUX ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACSNA ACZOJ ADHHG ADHIR ADINQ ADKNI ADRFC ADURQ ADYFF ADZKW AEBTG AEFQL AEGAL AEGNC AEJHL AEJRE AEMSY AEOHA AEPYU AETLH AEVLU AEXYK AFBBN AFFNX AFGCZ AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGJBK AGMZJ AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AI. AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARMRJ AXYYD B-. BA0 BDATZ BGNMA CAG COF CS3 DDRTE DNIVK DPUIP EBLON EBS EIOEI EJD ESBYG FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 H13 HF~ HG6 HLICF HMJXF HRMNR HZ~ IJ- IKXTQ IWAJR I~X I~Z J-C JBSCW JZLTJ KOV LLZTM M4Y MA- NPVJJ NQJWS NU0 O9- O93 O9J P9O PF0 PT4 QOS R89 R9I RNS ROL RPX RSV S16 S1Z S27 S3B SAP SCO SDH SHX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 TN5 TSG TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW VH1 W48 WK8 XU3 YLTOR Z7R Z83 Z88 ZMTXR ~A9 AAPKM AAYXX ABDBE ABFSG ABJCF ABRTQ ACSTC AEZWR AFDZB AFFHD AFHIU AFKRA AFOHR AHPBZ AHWEU AIXLP ARAPS ATHPR BENPR BGLVJ CCPQU CITATION HCIFZ K7- M7S PHGZM PHGZT PQGLB PTHSS JQ2 |
| ID | FETCH-LOGICAL-c1564-66a8657c030c4a5c44cb09d4378686d3012a1a076236ea8f6fb1d53d59ab25a93 |
| IEDL.DBID | RSV |
| ISSN | 0146-4116 |
| IngestDate | Wed Sep 17 23:57:50 EDT 2025 Sat Nov 29 05:52:11 EST 2025 Fri Feb 21 02:45:55 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 7 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c1564-66a8657c030c4a5c44cb09d4378686d3012a1a076236ea8f6fb1d53d59ab25a93 |
| Notes | erratum ObjectType-Correction/Retraction-1 SourceType-Scholarly Journals-1 content type line 14 |
| ORCID | 0000-0002-1491-524X |
| OpenAccessLink | https://link.springer.com/content/pdf/10.3103/S0146411622070094.pdf |
| PQID | 2778044454 |
| PQPubID | 2043879 |
| PageCount | 1 |
| ParticipantIDs | proquest_journals_2778044454 crossref_primary_10_3103_S0146411622070094 springer_journals_10_3103_S0146411622070094 |
| PublicationCentury | 2000 |
| PublicationDate | 20221200 |
| PublicationDateYYYYMMDD | 2022-12-01 |
| PublicationDate_xml | – month: 12 year: 2022 text: 20221200 |
| PublicationDecade | 2020 |
| PublicationPlace | Moscow |
| PublicationPlace_xml | – name: Moscow – name: New York |
| PublicationTitle | Automatic control and computer sciences |
| PublicationTitleAbbrev | Aut. Control Comp. Sci |
| PublicationYear | 2022 |
| Publisher | Pleiades Publishing Springer Nature B.V |
| Publisher_xml | – name: Pleiades Publishing – name: Springer Nature B.V |
| SSID | ssj0055886 |
| Score | 2.222044 |
| Snippet | An Erratum to this paper has been published: https://doi.org/10.3103/S0146411622070094 |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Index Database Publisher |
| StartPage | 828 |
| SubjectTerms | Computer Science Control Structures and Microprogramming Erratum |
| Title | Erratum to: On the Detection of Exploitation of Vulnerabilities That Leads to the Execution of a Malicious Code |
| URI | https://link.springer.com/article/10.3103/S0146411622070094 https://www.proquest.com/docview/2778044454 |
| Volume | 56 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAVX databaseName: SpringerLINK Contemporary 1997-Present customDbUrl: eissn: 1558-108X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0055886 issn: 0146-4116 databaseCode: RSV dateStart: 20070201 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELagMMBAoYAoFOSBCRSR-FWHDZVWDFAQlKpbZDu2QIIEtSni52O7icpzgDHy-RTZ53vIn78D4FAro5TBJjDWWAKiQhNIhFWgSMwlkyEy2nctuWz3-3w0im_Kd9yTCu1eXUl6T-3ryhCfOBgSI1HEELJmaquSRbBkox13p_H2bli5X0q5b-_opAMnPrvK_FnF52A0zzC_XIr6WNOr_-sv18FamVrCs5ktbIAFnTVAvWrbAMtT3ACrHzgIN0HeHTta5WdY5KfwOoM2IYTnuvAIrQzmBnqUXsnk7b6H0yfHVO1BtbbMhoMHUUDXqXNiVfjp3TetppW4gFc21VcOags7eaq3wH2vO-hcBGUXhkA5IpmAMcEZbSvrDRQRVBGiZBinBLc54yy1DgKJSITWqWKmBTfMyCilOKWxkIiKGG-DWpZnegdApXEkZGjtRsbWcQgexpgzSSNh8xiUsiY4qrYjeZmRbSS2SHELm3xb2CZoVRuWlOdukqC2I1QihNrh42qD5sO_Ktv9k_QeWEHuFYRHtbRArRhP9T5YVq_F42R84M3xHTgB12U |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NT9swFH-CMolxgI0x0fExH3Ziipb4K85uqCsCre2mrVS9RbZjC6QtQW2K-POx3UQdGxzGMfKzFdnP70Pv598D-GC01doSG1mnLBHVsY0UJjrSNBOKqxhbE7qWDNLRSEyn2ffmHfe8Rbu3JclgqUNeGZNPHobEaZJwjJ2auqxkHTaoc1gex_fj56Q1v4yJ0N7RS0defFnKfHyJh85oFWH-VRQNvuZs51l_-Qq2m9ASnS514TWsmXIXdtq2Dai5xbuw9QcH4Ruo-jNPq_wb1dVn9K1ELiBEX0wdEFolqiwKKL2Gydt_Txa_PFN1ANW6NBuNr2SNfKfOuVsiTO_fGb1oxSUaulBfe6gt6lWF2YPLs_64dx41XRgi7YlkIs6l4CzVzhpoKpmmVKs4KyhJBRe8cAYCy0TGzqgSbqSw3KqkYKRgmVSYyYy8hU5ZlWYfkDYkkSp2eqMyZzikiDMiuGKJdHEMLngXTtrjyG-WZBu5S1L8xub_bGwXDtsDy5t7N89x6gmVKGVu-GN7QKvhJxd791_S72HzfDwc5IOL0dcDeIn9i4iAcDmETj1bmCN4oW_r6_nsOKjmPVn22kk |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LT-MwEB5BQQgOvBGvXXzgtChq4lcdbqi0Ai0UpAXELbIdWyBBgtoU8fOx3USwCxxWHCOPrcgej2fkz98HsG-01doSG1nnLBHVsY0UJjrSNBWKqxhbE1RLzjqDgbi9TS9rndNRg3ZvriQnbxo8S1NRtZ9y2w41ZkzaHpLEaZJwjJ3LugplGmao1wzy5fqfmyYUMyaC1KO3jrz55Frz8yH-Ppjess1_LkjDudNf-vYfL8NinXKio4mPrMCUKVZhqZFzQPXuXoWFd9yEa1D2hp5u-RFV5SG6KJBLFNGxqQJyq0ClRQG9VzN8---b8YNnsA5gW1d-o6s7WSGv4DlyQ4TuvRejx425ROeuBNAegou6ZW7W4brfu-qeRLU6Q6Q9wUzEuRScdbSLEppKpinVKk5zSjqCC567wIFlImMXbAk3UlhuVZIzkrNUKsxkSjagVZSF2QSkDUmkip0_qdQFFCnilAiuWCJdfoNzvgW_mqXJniYkHJkrXvzEZh8mdgt2m8XL6v04ynDHEy1RylzzQbNYb81fDrb9X9Z7MHd53M_OTge_d2Ae-4cSAfiyC61qODY_YFY_V_ej4c_gpa9qiuMt |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Erratum+to%3A+On+the+Detection+of+Exploitation+of+Vulnerabilities+That+Leads+to+the+Execution+of+a+Malicious+Code&rft.jtitle=Automatic+control+and+computer+sciences&rft.au=Kosolapov%2C+Y+V&rft.date=2022-12-01&rft.pub=Springer+Nature+B.V&rft.issn=0146-4116&rft.eissn=1558-108X&rft.volume=56&rft.issue=7&rft.spage=828&rft.epage=828&rft_id=info:doi/10.3103%2FS0146411622070094&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0146-4116&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0146-4116&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0146-4116&client=summon |