[RDF data]
Home | Example Publications
PropertyValue
dcterms:bibliographicCitation <http://dblp.uni-trier.de/rec/bibtex/journals/usenix-login/BratusLPSS11>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Anna_Shubina>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Len_Sassaman>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Meredith_L._Patterson>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Michael_E._Locasto>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Sergey_Bratus>
foaf:homepage <https://www.usenix.org/publications/login/december-2011-volume-36-number-6/exploit-programming-buffer-overflows-weird>
dc:identifier DBLP journals/usenix-login/BratusLPSS11 (xsd:string)
dcterms:issued 2011 (xsd:gYear)
swrc:journal <https://dblp.l3s.de/d2r/resource/journals/usenix-login>
rdfs:label Exploit Programming: From Buffer Overflows to "Weird Machines" and Theory of Computation. (xsd:string)
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Anna_Shubina>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Len_Sassaman>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Meredith_L._Patterson>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Michael_E._Locasto>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Sergey_Bratus>
swrc:number 6 (xsd:string)
owl:sameAs <http://bibsonomy.org/uri/bibtexkey/journals/usenix-login/BratusLPSS11/dblp>
owl:sameAs <http://dblp.rkbexplorer.com/id/journals/usenix-login/BratusLPSS11>
rdfs:seeAlso <http://dblp.uni-trier.de/db/journals/usenix-login/usenix-login36.html#BratusLPSS11>
rdfs:seeAlso <https://www.usenix.org/publications/login/december-2011-volume-36-number-6/exploit-programming-buffer-overflows-weird>
dc:title Exploit Programming: From Buffer Overflows to "Weird Machines" and Theory of Computation. (xsd:string)
dc:type <http://purl.org/dc/dcmitype/Text>
rdf:type swrc:Article
rdf:type foaf:Document
swrc:volume 36 (xsd:string)