|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 6048 occurrences of 3544 keywords
|
|
|
Results
Found 5956 publication records. Showing 5956 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
47 | Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Thomas W. Reps, Randal E. Bryant |
Automatic discovery of API-level exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 27th International Conference on Software Engineering (ICSE 2005), 15-21 May 2005, St. Louis, Missouri, USA, pp. 312-321, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
API-level exploit, bounded model checking |
45 | Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker |
Beyond heuristics: learning to classify vulnerabilities and predict exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, July 25-28, 2010, pp. 105-114, 2010, ACM, 978-1-4503-0055-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
SVM, supervised learning, vulnerabilities, exploits |
39 | Stéphane Duverger |
Linux 2.6 kernel exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 4(1), pp. 39-60, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Justin Ma, John Dunagan, Helen J. Wang, Stefan Savage, Geoffrey M. Voelker |
Finding diversity in remote code injection exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, IMC 2006, Rio de Janeriro, Brazil, October 25-27, 2006, pp. 53-64, 2006, ACM, 1-59593-561-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
binary emulation, malware classification, worms, phylogeny, bots |
31 | Hung-Min Sun, Yue-Hsun Lin, Ming-Fung Wu |
API Monitoring System for Defeating Worms and Exploits in MS-Windows System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, pp. 159-170, 2006, Springer, 3-540-35458-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Worm Protection, API Hooking, System Security |
30 | Adam D. Todd, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Steven K. Rogers |
Alert Verification Evasion Through Server Response Forging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings, pp. 256-275, 2007, Springer, 978-3-540-74319-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Alert Verification, Network Intrusion Detection, Exploits, Evasion |
30 | Iván Arce |
The Shellcode Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(5), pp. 72-76, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
taxonomy of attacks, exploitation program, attack, exploits |
30 | Stuart E. Schechter, Michael D. Smith 0001 |
How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers, pp. 122-137, 2003, Springer, 3-540-40663-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Theft, Exploits, Threat Models, Security Economics |
27 | Madhusudhanan Chandrasekaran, Mukarram Baig, Shambhu J. Upadhyaya |
AEGIS: A Proactive Methodology to Shield against Zero-Day Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (2) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 2, May 21-23, 2007, Niagara Falls, Canada, pp. 556-563, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | John G. Levine, Julian B. Grizzard, Henry L. Owen |
A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, USA, pp. 107-128, 2004, IEEE Computer Society, 0-7695-2117-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Helen J. Wang, Chuanxiong Guo, Daniel R. Simon, Alf Zugenmaier |
Shield: vulnerability-driven network filters for preventing known vulnerability exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30 - September 3, 2004, Portland, Oregon, USA, pp. 193-204, 2004, ACM, 1-58113-862-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
generic protocol analyzer, network filter, vulnerability signature, worm defense, patching |
26 | Marco Cova, Christopher Krügel, Giovanni Vigna |
Detection and analysis of drive-by-download attacks and malicious JavaScript code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, Raleigh, North Carolina, USA, April 26-30, 2010, pp. 281-290, 2010, ACM, 978-1-60558-799-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
drive-by-download attacks, web client exploits, anomaly detection |
26 | Amontip Jumratjaroenvanit, Yunyong Teng-Amnuay |
Probability of Attack Based on System Vulnerability Life Cycle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 531-535, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Zero-day attack, Exploit code, Risk window, Radar chart, Vulnerability, Exploits, Life cycle, Exposure, POA |
26 | Jose Nazario |
Where the worms aren't. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WORM ![In: Proceedings of the 2006 ACM Workshop on Rapid Malcode, WORM 2006, Alexandria, VA, USA, November 3, 2006, pp. 49-50, 2006, ACM Press, 1-59593-551-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
securty, worms, vulnerabilities, botnets, exploits |
26 | Prabhaker Mateti |
A laboratory-based course on internet security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 34th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2003, Reno, Nevada, USA, February 19-23, 2003, pp. 252-256, 2003, ACM, 1-58113-648-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
TCP/IP exploits, network security, ethics, firewalls, buffer overflow, internet security |
24 | Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer |
Analyzing network traffic to detect self-decrypting exploit code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 4-12, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
exploit code, static analysis, emulation, detection, polymorphic, decryption |
24 | Paul Ammann, Duminda Wijesekera, Saket Kaushik |
Scalable, graph-based network vulnerability analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002, pp. 217-224, 2002, ACM, 1-58113-612-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
monotonic analysis, model checking, scalability, network security, vulnerability, exploit |
23 | Mohammad M. Masud 0001, Latifur Khan, Bhavani Thuraisingham, Xinran Wang, Peng Liu 0005, Sencun Zhu |
Detecting Remote Exploits Using Data Mining. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Int. Conf. Digital Forensics ![In: Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008, pp. 177-189, 2008, Springer, 978-0-387-84926-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Server attacks, exploit code, data mining, attack detection |
23 | Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi |
Diversified Process Replicæ for Defeating Memory Error Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 26th IEEE International Performance Computing and Communications Conference, IPCCC 2007, April 11-13, 2007, New Orleans, Louisiana, USA, pp. 434-441, 2007, IEEE Computer Society, 1-4244-1138-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Madhusudhanan Chandrasekaran, Mukarram Baig, Shambhu J. Upadhyaya |
AVARE: aggregated vulnerability assessment and response against zero-day exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 25th IEEE International Performance Computing and Communications Conference, IPCCC 2006, April 10-12, 2006, Phoenix, Arizona, USA, 2006, IEEE, 1-4244-0198-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Jedidiah R. Crandall, Zhendong Su 0001, Shyhtsun Felix Wu, Frederic T. Chong |
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 235-248, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
metamorphism, polymorphism, symbolic execution, worms, honeypots, polymorphic worms |
23 | Alf Zugenmaier |
Countering Automated Exploits with System Security CAPTCHAS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, pp. 170-179, 2005, Springer, 978-3-540-77155-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Giovanni Vigna, William K. Robertson, Davide Balzarotti |
Testing network-based intrusion detection signatures using mutant exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 21-30, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
intrusion detection, security testing, quality metrics |
19 | Islam Obaidat, Meera Sridhar, Fatemeh Tavakoli |
DAEDALUS: Defense Against Firmware ROP Exploits Using Stochastic Software Diversity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.16234, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Seth Copen Goldstein, Sixiang Gao, Zhenbo Sun |
BlockGraph: a scalable secure distributed ledger that exploits locality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Distributed Parallel Databases ![In: Distributed Parallel Databases 42(2), pp. 217-244, June 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Christoforos Prasatzakis, Theodore Patkos, Dimitris Plexousakis |
An Intuitive Architecture for a Chatbot that Exploits High-Level Reasoning for Human?Robot Interaction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ERCIM News ![In: ERCIM News 2023(134), 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
19 | Cainã Figueiredo, João Gabriel Lopes de Oliveira, Rodrigo Azevedo Santos, Daniel Vieira, Lucas Miranda, Gerson Zaverucha, Leandro Pfleger de Aguiar, Daniel Sadoc Menasché |
A Statistical Relational Learning Approach Towards Products, Software Vulnerabilities and Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Netw. Serv. Manag. ![In: IEEE Trans. Netw. Serv. Manag. 20(3), pp. 3782-3802, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Zihao Liu, Arash Moradinegade Dizqah, Jose M. Herreros, Joschka Schaub, Olivier C. L. Haas |
A Hierarchical Economic Model Predictive Controller That Exploits Look-Ahead Information of Roads to Boost Engine Performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Control. Syst. Technol. ![In: IEEE Trans. Control. Syst. Technol. 31(6), pp. 2632-2643, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Hadi Eskandari, Michael Bewong, Sabih ur Rehman |
OutCenTR: A novel semi-supervised framework for predicting exploits of vulnerabilities in high-dimensional datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2304.10511, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Andrei Costin, Syed Khandker, Hannu Turtiainen, Timo Hämäläinen 0002 |
Cybersecurity of COSPAS-SARSAT and EPIRB: threat and attacker models, exploits, future research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2302.08361, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Imen Sayar, Alexandre Bartel, Eric Bodden, Yves Le Traon |
An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Softw. Eng. Methodol. ![In: ACM Trans. Softw. Eng. Methodol. 32(1), pp. 25:1-25:45, January 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Guangquan Xu, Wenqing Lei, Lixiao Gong, Jian Liu 0004, Hongpeng Bai, Kai Chen 0012, Ran Wang, Wei Wang 0012, Kaitai Liang, Weizhe Wang, Weizhi Meng 0001, Shaoying Liu |
UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 125, pp. 103048, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Zhongyu Pei, Xingman Chen, Songtao Yang, Haixin Duan, Chao Zhang 0008 |
TAICHI: Transform Your Secret Exploits Into Mine From a Victim's Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 20(6), pp. 5278-5292, November - December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Prabith GS, S. Abhishek, Anjali T, Radhika Ravindran |
Zero-Click Exploits and Malware: An In-Depth Analysis and Case Studies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 16th International Conference on Security of Information and Networks, SIN 2023, Jaipur, India, November 20-21, 2023, pp. 1-9, 2023, IEEE, 979-8-3503-4321-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | K. Mohamed Sharaafat, Yi Ling Celeste Lau, Sebastian Wong, Yu Tan, Muhammad Khairin Bin Mohd, Isaac Medina Agatep, Zhiyuan Zhang 0004, Huaqun Guo |
Data Crawling for Malware Analysis for Holistic Prevention of Future Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCS ![In: 8th International Conference on Computer and Communication Systems, ICCCS 2023, Guangzhou, China, April 21-23, 2023, pp. 719-724, 2023, IEEE, 978-1-6654-5612-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Artur Balsam, Maciej Roman Nowak, Michal Walkowski, Jacek Oko, Slawomir Sujecki |
Analysis of CVSS Vulnerability Base Scores in the Context of Exploits' Availability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTON ![In: 23rd International Conference on Transparent Optical Networks, ICTON 2023, Bucharest, Romania, July 2-6, 2023, pp. 1-4, 2023, IEEE, 979-8-3503-0303-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Xiaoming Ruan, Yaoxiang Yu, Wenhao Ma, Bo Cai |
Prompt Learning for Developing Software Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internetware ![In: Proceedings of the 14th Asia-Pacific Symposium on Internetware, Internetware 2023, Hangzhou, China, August 4-6, 2023, pp. 154-164, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Andrei Costin, Hannu Turtiainen, Syed Khandkher, Timo Hämäläinen 0002 |
Cybersecurity of COSPAS-SARSAT and EPIRB: threat and attacker models, exploits, future research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpaceSec ![In: 1st Workshop on Security of Space and Satellite Systems, SpaceSec 2023, San Diego, California, USA, Feburary, 27, 2023., 2023, The Internet Society, 1-891562-89-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Richard Ward, Andrew Johnson 0008 |
Identifying Microbenchmark Signatures of Existing Microarchitectural Exploits Using the Unified Side Channel Attack - Model (USCA-M) Four-Phase Testing Process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISDFS ![In: 11th International Symposium on Digital Forensics and Security, ISDFS 2023, Chattanooga, TN, USA, May 11-12, 2023, pp. 1-5, 2023, IEEE, 979-8-3503-3698-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Shi-Ming Lu, Hsuan-Jung Su, Ming-Ting Chen |
An Adaptive Duplex Switching Scheme That Exploits Interference Statistics for Hybrid-Duplex Cellular Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPMC ![In: 26th International Symposium on Wireless Personal Multimedia Communications, WPMC 2023, Tampa, FL, USA, November 19-22, 2023, pp. 1-6, 2023, IEEE, 979-8-3503-0890-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Eric Pauley, Paul Barford, Patrick D. McDaniel |
The CVE Wayback Machine: Measuring Coordinated Disclosure from Exploits against Two Years of Zero-Days. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMC ![In: Proceedings of the 2023 ACM on Internet Measurement Conference, IMC 2023, Montreal, QC, Canada, October 24-26, 2023, pp. 236-252, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Talal Halabi, Mohammad Zulkernine |
The Ultimate Battle Against Zero-Day Exploits: Toward Fully Autonomous Cyber-Physical Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSE ![In: IEEE International Conference on Software Services Engineering, SSE 2023, Chicago, IL, USA, July 2-8, 2023, pp. 256-261, 2023, IEEE, 979-8-3503-4075-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Carlo Baldassi |
Recombinator-k-Means: An Evolutionary Algorithm That Exploits k-Means++ for Recombination. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Evol. Comput. ![In: IEEE Trans. Evol. Comput. 26(5), pp. 991-1003, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Marko Rogge |
0-Day-Exploits - Bange machen gilt nicht. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirtschaftsinformatik Manag. ![In: Wirtschaftsinformatik Manag. 14(6), pp. 403-406, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Yasmany Prieto, Miguel E. Figueroa, Jorge E. Pezoa |
Guaranteeing Network Reliability to 0-Day Exploits Using Cost-Effective Heterogeneous Node Migration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 111153-111170, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Shaochen Wang, Zhangli Zhou, Zhen Kan |
When Transformer Meets Robotic Grasping: Exploits Context for Efficient Grasp Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Robotics Autom. Lett. ![In: IEEE Robotics Autom. Lett. 7(3), pp. 8170-8177, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Tin Lai, Fabio Ramos 0001 |
Adaptively Exploits Local Structure With Generalised Multi-Trees Motion Planning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Robotics Autom. Lett. ![In: IEEE Robotics Autom. Lett. 7(2), pp. 1111-1117, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Sagar Samtani, Yidong Chai, Hsinchun Chen |
Linking Exploits from the Dark Web to Known Vulnerabilities for Proactive Cyber Threat Intelligence: An Attention-Based Deep Structured Semantic Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIS Q. ![In: MIS Q. 46(2), pp. 911-946, May 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Shaochen Wang, Zhangli Zhou, Zhen Kan |
When Transformer Meets Robotic Grasping: Exploits Context for Efficient Grasp Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2202.11911, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
19 | Chen Yan 0001, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji 0001, Wenyuan Xu 0001 |
Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2204.02675, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Yang Su, Damith C. Ranasinghe |
Leaving Your Things Unattended is No Joke! Memory Bus Snooping and Open Debug Interface Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2201.07462, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
19 | Jie Fu |
On Almost-Sure Intention Deception Planning that Exploits Imperfect Observers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2209.00573, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Imen Sayar, Alexandre Bartel, Eric Bodden, Yves Le Traon |
An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2208.08173, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Soufian El Yadmani, Robin The, Olga Gadyatskaya |
How security professionals are being attacked: A study of malicious CVE proof of concept exploits in GitHub. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2210.08374, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Jonah Burgess |
Malware and Exploits on the Dark Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2211.15405, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Huan He, Shifan Zhao, Ziyuan Tang, Joyce C. Ho, Yousef Saad, Yuanzhe Xi |
An Efficient Nonlinear Acceleration method that Exploits Symmetry of the Hessian. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2210.12573, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Marek Janiszewski, Marcin Rytel, Piotr Lewandowski, Hubert Romanowski |
Creating vulnerabilities and exploits database of IoT devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EICC ![In: EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15 - 16, 2022, pp. 91-92, 2022, ACM, 978-1-4503-9603-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Leona McNulty, Vassilios G. Vassilakis |
IoT Botnets: Characteristics, Exploits, Attack Capabilities, and Targets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSNDSP ![In: 13th International Symposium on Communication Systems, Networks and Digital Signal Processing, CSNDSP 2022, Porto, Portugal, July 20-22, 2022, pp. 350-355, 2022, IEEE, 978-1-6654-1044-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Serge Demeyer, Henrique Rocha, Darin Verheijke |
Refactoring Solidity Smart Contracts to Protect Against Reentrancy Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISoLA (2) ![In: Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering - 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22-30, 2022, Proceedings, Part II, pp. 324-344, 2022, Springer, 978-3-031-19755-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Jie Fu |
On Almost-Sure Intention Deception Planning that Exploits Imperfect Observers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GameSec ![In: Decision and Game Theory for Security - 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings, pp. 67-86, 2022, Springer, 978-3-031-26368-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Swati Kiran Rajput, R. Umamageswari, Rajesh Singh 0001, Lalit Thakur, C. P. Sanjay, Maddikera Kalyan Chakravarthi |
Understanding IoT Security: A Point-by-point Investigation of IoT Weaknesses and a First Exact Glance at Web Scale IoT Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IC3I ![In: 5th International Conference on Contemporary Computing and Informatics, IC3I 2022, Uttar Pradesh, India, December 14-16, 2022, pp. 1677-1683, 2022, IEEE, 979-8-3503-9826-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Matteo Italia, Fabio Dercole |
Optimal control of two cytotoxic drug maximum tolerated dose steers and exploits cancer adaptive resistance in a cell-based framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECC ![In: European Control Conference, ECC 2022, London, United Kingdom, July 12-15, 2022, pp. 247-252, 2022, IEEE, 978-3-9071-4407-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Octavian Suciu, Connor Nelson, Zhuoer Lyu, Tiffany Bao, Tudor Dumitras |
Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022, pp. 377-394, 2022, USENIX Association, 978-1-939133-31-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
19 | Chen Yan 0001, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji 0001, Wenyuan Xu 0001 |
Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022, pp. 1957-1974, 2022, USENIX Association, 978-1-939133-31-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
19 | Yang Su, Damith C. Ranasinghe |
Leaving Your Things Unattended is No Joke! Memory Bus Snooping and Open Debug Interface Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom Workshops ![In: 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom 2022 Workshops, Pisa, Italy, March 21-25, 2022, pp. 643-648, 2022, IEEE, 978-1-6654-1647-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Arwa Abdulkarim Al Alsadi, Kaichi Sameshima, Jakob Bleier, Katsunari Yoshioka, Martina Lindorfer, Michel van Eeten, Carlos Hernandez Gañán |
No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022, pp. 309-321, 2022, ACM, 978-1-4503-9140-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Amirreza Yousefzadeh, Manolis Sifalakis |
Delta Activation Layer exploits temporal sparsity for efficient embedded video processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN ![In: International Joint Conference on Neural Networks, IJCNN 2022, Padua, Italy, July 18-23, 2022, pp. 1-10, 2022, IEEE, 978-1-7281-8671-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Benjamin Drozdenko, Makia Powell |
Utilizing Deep Learning Techniques to Detect Zero Day Exploits in Network Traffic Flows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UEMCON ![In: 13th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference, UEMCON 2022, New York, NY, USA, October 26-29, 2022, pp. 163-172, 2022, IEEE, 978-1-6654-9299-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | David Klein, Marius Musch, Thomas Barber, Moritz Kopmann, Martin Johns |
Accept All Exploits: Exploring the Security Impact of Cookie Banners. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Annual Computer Security Applications Conference, ACSAC 2022, Austin, TX, USA, December 5-9, 2022, pp. 911-922, 2022, ACM, 978-1-4503-9759-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Prashant Anantharaman |
Protecting Systems From Exploits Using Language-Theoretic Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
RDF |
|
19 | Tom McVey |
Browser exploits: ensuring safety when surfing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Netw. Secur. ![In: Netw. Secur. 2021(5), pp. 6, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Jie Wang 0037, Victor Magron, Jean-Bernard Lasserre |
TSSOS: A Moment-SOS Hierarchy That Exploits Term Sparsity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIAM J. Optim. ![In: SIAM J. Optim. 31(1), pp. 30-58, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Jie Wang 0037, Victor Magron, Jean-Bernard Lasserre |
Chordal-TSSOS: A Moment-SOS Hierarchy That Exploits Term Sparsity with Chordal Extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIAM J. Optim. ![In: SIAM J. Optim. 31(1), pp. 114-141, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Wooseung Nam, Joohyun Lee, Ness B. Shroff, Kyunghan Lee |
An Inter-Data Encoding Technique that Exploits Synchronized Data for Network Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 20(1), pp. 76-92, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Mingyu Guo, Guanhua Wang, Hideaki Hata, Muhammad Ali Babar 0001 |
Revenue maximizing markets for zero-day exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Auton. Agents Multi Agent Syst. ![In: Auton. Agents Multi Agent Syst. 35(2), pp. 36, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Yasmany Prieto, Miguel E. Figueroa, Jorge E. Pezoa |
Maximizing Network Reliability to 0-Day Exploits Through a Heterogeneous Node Migration Strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 97747-97759, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Mohammad Hallal, Mariette Awad, Pierre H. Khoueiry |
TempoMAGE: a deep learning framework that exploits the causal dependency between time-series data to predict histone marks in open chromatin regions at time-points with missing ChIP-seq datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bioinform. ![In: Bioinform. 37(23), pp. 4336-4342, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Tin Lai |
Rapidly-exploring Random Forest: Adaptively Exploits Local Structure with Generalised Multi-Trees Motion Planning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2103.04487, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
19 | Vittorio Lippi |
Deep Learning Based Model Identification System Exploits the Modular Structure of a Bio-Inspired Posture Control Model for Humans and Humanoids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2102.02536, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
19 | Octavian Suciu, Connor Nelson, Zhuoer Lyu, Tiffany Bao, Tudor Dumitras |
Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2102.07869, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
19 | Stephen B. Wicker |
The ethics of zero-day exploits - : the NSA meets the trolley car. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 64(1), pp. 97-103, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Jan Van den Herrewegen, David F. Oswald, Flavio D. Garcia, Qais Temeiza |
Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Cryptogr. Hardw. Embed. Syst. ![In: IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1), pp. 56-81, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Kjell Hausken, Jonathan W. Welburn |
Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 23(6), pp. 1609-1620, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Vittorio Lippi |
Deep Learning based Model Identification System Exploits the Modular Structure of a Bio-inspired Posture Control Model for Humans and Humanoids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPRAM ![In: Proceedings of the 10th International Conference on Pattern Recognition Applications and Methods, ICPRAM 2021, Online Streaming, February 4-6, 2021., pp. 540-547, 2021, SCITEPRESS, 978-989-758-486-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Cainã Figueiredo, João Gabriel Lopes, Rodrigo Azevedo Santos, Gerson Zaverucha, Daniel Sadoc Menasché, Leandro Pfleger de Aguiar |
Software Vulnerabilities, Products and Exploits: A Statistical Relational Learning Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSR ![In: IEEE International Conference on Cyber Security and Resilience, CSR 2021, Rhodes, Greece, July 26-28, 2021, pp. 41-46, 2021, IEEE, 978-1-6654-0285-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Cristian Toma, Catalin Boja, Marius Popa, Mihai Doinea, Cristian Ciurea |
Viruses, Exploits, Malware and Security Issues on IoT Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecITC ![In: Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers, pp. 324-334, 2021, Springer, 978-3-031-17509-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Carter Yagemann, Matthew Pruett, Simon P. Chung, Kennon Bittick, Brendan Saltaformaggio, Wenke Lee |
ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, pp. 1989-2006, 2021, USENIX Association, 978-1-939133-24-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
19 | Shangcheng Shi, Xianbo Wang, Kyle Zeng, Ronghai Yang, Wing Cheong Lau |
An Empirical Study on Mobile Payment Credential Leaks and Their Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm (2) ![In: Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part II, pp. 79-98, 2021, Springer, 978-3-030-90021-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Bramwell Brizendine, Austin Babcock |
A Novel Method for the Automatic Generation of JOP Chain Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCS ![In: National Cyber Summit (NCS) Research Track 2021, Huntsville, AL, USA, September 28-30, 2021, pp. 77-92, 2021, Springer, 978-3-030-84613-8. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Josh Huddleston, Pu Ji, Suman Bhunia, Joel Cogan |
How VMware Exploits Contributed to SolarWinds Supply-chain Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCI ![In: International Conference on Computational Science and Computational Intelligence, CSCI 2021, Las Vegas, NV, USA, December 15-17, 2021, pp. 760-765, 2021, IEEE, 978-1-6654-5841-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Pin Lyu, Wandong Cai, Yao Wang 0005 |
Active Attack that Exploits Biometric Similarity Difference and Basic Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADHOCNETS/TRIDENTCOM ![In: Ad Hoc Networks and Tools for IT - 13th EAI International Conference, ADHOCNETS 2021, Virtual Event, December 6-7, 2021, and 16th EAI International Conference, TRIDENTCOM 2021, Virtual Event, November 24, 2021, Proceedings, pp. 81-95, 2021, Springer, 978-3-030-98004-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Tuong Phi Lau |
Software Reuse Exploits in Node.js Web Apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSRS ![In: 5th International Conference on System Reliability and Safety, ICSRS 2021, Palermo, Italy, November 24-26, 2021, pp. 190-197, 2021, IEEE, 978-1-6654-0049-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Salman Ahmed 0001, Long Cheng 0005, Hans Liljestrand, N. Asokan, Danfeng Daphne Yao |
Tutorial: Investigating Advanced Exploits for System Security Assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecDev ![In: IEEE Secure Development Conference, SecDev 2021, Atlanta, GA, USA, October 18-20, 2021, pp. 3-4, 2021, IEEE, 978-1-6654-3170-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Falin Hou, Xiao Yu, Kefan Qiu, Junli Liu, Zhiwei Shi, Yuanzhang Li |
Research on Off-Path Exploits of Network Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DMBD (1) ![In: Data Mining and Big Data - 6th International Conference, DMBD 2021, Guangzhou, China, October 20-22, 2021, Proceedings, Part I, pp. 73-80, 2021, Springer, 978-981-16-7475-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Asmit De, Mohammad Nasim Imtiaz Khan, Karthikeyan Nagarajan, Swaroop Ghosh |
HarTBleed: Using Hardware Trojans for Data Leakage Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Very Large Scale Integr. Syst. ![In: IEEE Trans. Very Large Scale Integr. Syst. 28(4), pp. 968-979, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Xueyan Wang, Jianlei Yang 0001, Yinglin Zhao, Xiaotao Jia, Gang Qu 0001, Weisheng Zhao |
Hardware Security in Spin-based Computing-in-memory: Analysis, Exploits, and Mitigation Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM J. Emerg. Technol. Comput. Syst. ![In: ACM J. Emerg. Technol. Comput. Syst. 16(4), pp. 37:1-37:18, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Mingyu Guo, Hideaki Hata, Ali Babar 0001 |
Revenue Maximizing Markets for Zero-Day Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2006.14184, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
19 | Mingyu Guo, Hideaki Hata, Ali Babar 0001 |
Optimizing Affine Maximizer Auctions via Linear Programming: an Application to Revenue Maximizing Mechanism Design for Zero-Day Exploits Markets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2006.14185, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
19 | Xuewei Feng, Chuanpu Fu, Qi Li 0002, Kun Sun 0001, Ke Xu 0002 |
Off-Path TCP Exploits of the Mixed IPID Assignment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2008.12981, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
19 | Xueyan Wang, Jianlei Yang 0001, Yinglin Zhao, Xiaotao Jia, Gang Qu 0001, Weisheng Zhao |
Hardware Security in Spin-Based Computing-In-Memory: Analysis, Exploits, and Mitigation Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2006.01425, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
Displaying result #1 - #100 of 5956 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|