|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1155 occurrences of 729 keywords
|
|
|
Results
Found 2062 publication records. Showing 2062 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
95 | Fu-Hau Hsu, Fanglu Guo, Tzi-cker Chiueh |
Scalable network-based buffer overflow attack detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANCS ![In: Proceedings of the 2006 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, ANCS 2006, San Jose, California, USA, December 3-5, 2006, pp. 163-172, 2006, ACM, 1-59593-580-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
CTCP, generalized attack signatures, network-based intrusion detection, payload bypassing, return-into-libc attacks, buffer overflow attacks |
86 | Surupa Biswas, Thomas W. Carley, Matthew S. Simpson, Bhuvan Middha, Rajeev Barua |
Memory overflow protection for embedded systems using run-time checks, reuse, and compression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Embed. Comput. Syst. ![In: ACM Trans. Embed. Comput. Syst. 5(4), pp. 719-752, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Out-of-memory errors, reliability, data compression, reuse, run-time checks, heap overflow, stack overflow |
84 | Per-Åke Larson |
Analysis of Index-Sequential Files with Overflow Chaining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 6(4), pp. 671-680, 1981. The full citation details ...](Pics/full.jpeg) |
1981 |
DBLP DOI BibTeX RDF |
ISAM, index sequential files, indexed sequential access method, overflow chaining, overflow handling, performance analysis, analytic model, analysis of algorithms, file organization, overflow, file structure |
79 | Yong-Joon Park, Gyungho Lee |
Repairing return address stack for buffer overflow protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Conf. Computing Frontiers ![In: Proceedings of the First Conference on Computing Frontiers, 2004, Ischia, Italy, April 14-16, 2004, pp. 335-342, 2004, ACM, 1-58113-741-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
computer architecture, computer security, buffer overflow, intrusion tolerance |
71 | Han Zhou, Chong Hwa Ghang, Da Tong Han |
A dynamic bandwidth allocation scheme for ATM networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 4th International Conference on Computer Communications and Networks (ICCCN '95), September 20-23, 1995, Las Vegas, Nevada, USA, pp. 316, 1995, IEEE Computer Society, 0-8186-7180-7. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
minimum overflow traffic algorithm, multiclass traffic environment, overflow traffic function, bandwidth assignment, mean overflow traffic to bandwidth ratio, optimization object function, average virtual cell loss probability, link capacity, quality of service, performance evaluation, asynchronous transfer mode, ATM networks, high throughput, dynamic bandwidth allocation |
69 | Deok Jin Kim, Tae-Hyung Kim, Jong Kim 0001, Sung Je Hong |
Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings, pp. 238-252, 2006, Springer, 3-540-49608-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Return Address, return-into-libc Attack, Data Injection Buffer Overflow Attack, Security, Randomization, Buffer Overflow, Instruction Set |
65 | Michel Mandjes, Ad Ridder |
A large deviations analysis of the transient of a queue with many Markov fluid inputs: approximations and fast simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Model. Comput. Simul. ![In: ACM Trans. Model. Comput. Simul. 12(1), pp. 1-26, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
importance sampling simulations, large deviations asymptotics, transient probabilities, buffer overflow, queuing theory, IP routers, calculus of variations, ATM multiplexers |
64 | Vinaitheerthan Sundaram, Sandip HomChaudhuri, Sachin Garg, Chandra M. R. Kintala, Saurabh Bagchi |
Improving Dependability Using Shared Supplementary Memory and Opportunistic Micro Rejuvenation in Multi-tasking Embedded Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 17-19 December, 2007, Melbourne, Victoria, Australia, pp. 240-247, 2007, IEEE Computer Society, 0-7695-3054-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
resource constrained fault-tolerance, embedded systems, software rejuvenation, heap overflow, stack overflow |
63 | Yongjian Hu, Heung-Kyu Lee, Jianwei Li |
DE-Based Reversible Data Hiding With Improved Overflow Location Map. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. Video Technol. ![In: IEEE Trans. Circuits Syst. Video Technol. 19(2), pp. 250-260, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
62 | Tzu-Rung Lee, Kwo-Cheng Chiu, Da-Wei Chang |
A Lightweight Buffer Overflow Protection Mechanism with Failure-Oblivious Capability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICA3PP ![In: Algorithms and Architectures for Parallel Processing, 9th International Conference, ICA3PP 2009, Taipei, Taiwan, June 8-11, 2009. Proceedings, pp. 661-672, 2009, Springer, 978-3-642-03094-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Failure-Oblivious Computing, Guard Pages, Network Security, Self Reconfiguration, Buffer Overflow Attacks |
62 | Andrzej Chydzinski |
Time to Buffer Overflow in an MMPP Queue. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, 6th International IFIP-TC6 Networking Conference, Atlanta, GA, USA, May 14-18, 2007, Proceedings, pp. 879-889, 2007, Springer, 978-3-540-72605-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
MMPP queue, Performance evaluation, buffer overflow |
62 | Shensheng Tang, Wei Wayne Li |
Modeling and analysis of hierarchical cellular networks with bidirectional overflow and take-back strategies under generally distributed cell residence times. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 32(1), pp. 71-91, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Take-back, Channel occupancy time, Handoff, Overflow, Cell residence time, Hierarchical cellular networks |
62 | Wenhao Shan, Pingzhi Fan, Yi Pan 0001 |
Performance Evaluation of a Hierarchical Cellular System with Mobile Velocity-Based Bidirectional Call-Overflow Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 14(1), pp. 72-83, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Hierarchical cellular system, guard channel, Markov process, overflow |
62 | Thomas Toth, Christopher Krügel |
Accurate Buffer Overflow Detection via Abstract Payload Execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings, pp. 274-291, 2002, Springer, 3-540-00020-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Intrusion Detecion, Buffer Overflow Exploit, Network Security |
62 | Michael J. Schulte, Pablo I. Balzola, Ahmet Akkas, Robert W. Brocato |
Integer Multiplication with Overflow Detection or Saturation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 49(7), pp. 681-691, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
unsigned, tree multipliers, computer arithmetic, array multipliers, Overflow, saturation, integer, two's complement |
61 | Surupa Biswas, Matthew S. Simpson, Rajeev Barua |
Memory overflow protection for embedded systems using run-time checks, reuse and compression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASES ![In: Proceedings of the 2004 International Conference on Compilers, Architecture, and Synthesis for Embedded Systems, CASES 2004, Washington DC, USA, September 22 - 25, 2004, pp. 280-291, 2004, ACM, 1-58113-890-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
out-of-memory errors, reliability, data compression, reuse, runtime checks, heap overflow, stack overflow |
55 | Babak Salamat, Andreas Gal, Todd Jackson, Karthikeyan Manivannan, Gregor Wagner, Michael Franz |
Multi-variant Program Execution: Using Multi-core Systems to Defuse Buffer-Overflow Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISIS ![In: Second International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2008), March 4th-7th, 2008, Technical University of Catalonia, Barcelona, Spain, pp. 843-848, 2008, IEEE Computer Society, 978-0-7695-3109-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Martin C. Rinard, Cristian Cadar, Daniel Dumitran, Daniel M. Roy 0001, Tudor Leu |
A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA, pp. 82-90, 2004, IEEE Computer Society, 0-7695-2252-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
55 | Zili Shao, Qingfeng Zhuge, Yi He 0001, Edwin Hsing-Mean Sha |
Defending Embedded Systems Against Buffer Overflow via Hardware/Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 19th Annual Computer Security Applications Conference (ACSAC 2003), 8-12 December 2003, Las Vegas, NV, USA, pp. 352-361, 2003, IEEE Computer Society, 0-7695-2041-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
55 | Tzi-cker Chiueh, Fu-Hau Hsu |
RAD: A Compile-Time Solution to Buffer Overflow Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), Phoenix, Arizona, USA, April 16-19, 2001, pp. 409-417, 2001, IEEE Computer Society, 0-7695-1077-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
54 | Mustafa Gök, Michael J. Schulte, Mark G. Arnold |
Integer Multipliers with Overflow Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 55(8), pp. 1062-1066, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
high-speed arithmetic algorithms, overflow detection, Computer arithmetic, multiplication, combinational logic |
54 | Zili Shao, Chun Xue, Qingfeng Zhuge, Mei Kang Qiu, Bin Xiao 0001, Edwin Hsing-Mean Sha |
Security Protection and Checking for Embedded System Integration against Buffer Overflow Attacks via Hardware/Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 55(4), pp. 443-453, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
hardware/software, Security, embedded system, protection, buffer overflow attack |
54 | Krerk Piromsopa, Richard J. Enbody |
Secure Bit: Transparent, Hardware Buffer-Overflow Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 3(4), pp. 365-376, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Buffer overflow, security and protection, security kernels, invasive software |
54 | Mustapha Refai |
Exploiting a buffer overflow using metasploit framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 74, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
metasploit, framework, buffer overflow, exploit, buffer overrun |
54 | Yi-Bing Lin |
Eliminating Overflow for Large-Scale Mobility Databases in Cellular Telephone Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 50(4), pp. 356-370, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Cellular telephone network, database overflow, visitor location register, home location register, large-scale database |
47 | Yoonseo Choi, Hwansoo Han |
Optimal register reassignment for register stack overflow minimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Archit. Code Optim. ![In: ACM Trans. Archit. Code Optim. 3(1), pp. 90-114, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
register stack, sequence graph, register allocation, Register assignment |
47 | Hiroyasu Nishiyama |
SecureC: Control-Flow Protection Against General Buffer Overflow Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (1) ![In: 29th Annual International Computer Software and Applications Conference, COMPSAC 2005, Edinburgh, Scotland, UK, July 25-28, 2005. Volume 1, pp. 149-155, 2005, IEEE Computer Society, 0-7695-2413-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Bharat B. Madan, Shashi Phoha, Kishor S. Trivedi |
StackOFFence: A Technique for Defending Against Buffer Overflow Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 656-661, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Zili Shao, Chun Xue, Qingfeng Zhuge, Edwin Hsing-Mean Sha, Bin Xiao 0001 |
Efficient Array & Pointer Bound Checking Against Buffer Overflow Attacks via Hardware/Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 780-785, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Nathan Tuck, Brad Calder, George Varghese |
Hardware and Binary Modification Support for Code Pointer Protection From Buffer Overflow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICRO ![In: 37th Annual International Symposium on Microarchitecture (MICRO-37 2004), 4-8 December 2004, Portland, OR, USA, pp. 209-220, 2004, IEEE Computer Society, 0-7695-2126-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
47 | Lynn Choi, Yong Shin |
Enforcement of Architectural Safety Guards to Deter Malicious Code Attacks through Buffer Overflow Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARCS ![In: Organic and Pervasive Computing - ARCS 2004, International Conference on Architecture of Computing Systems, Augsburg, Germany, March 23-26, 2004, Proceedings, pp. 47-60, 2004, Springer, 3-540-21238-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
47 | Jiahua Zhu, HongJiang Zhang, Hui Shi, Binyu Zang, Chuanqi Zhu |
Overflow Controlled SIMD Arithmetic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCPC ![In: Languages and Compilers for High Performance Computing, 17th International Workshop, LCPC 2004, West Lafayette, IN, USA, September 22-24, 2004, Revised Selected Papers, pp. 424-438, 2004, Springer, 3-540-28009-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
47 | Ioannis Ch. Paschalidis, Spyridon Vassilaras |
Model-based estimation of buffer overflow probabilities from measurements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS/Performance ![In: Proceedings of the Joint International Conference on Measurements and Modeling of Computer Systems, SIGMETRICS/Performance 2001, June 16-20, 2001, Cambridge, MA, USA, pp. 154-163, 2001, ACM, 1-58113-334-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Akaike's information criterion, estimation, large deviations, effective bandwidth, Markov-modulated processes |
45 | Mariusz Glabowski, Katarzyna Kubasik, Maciej Stasiak |
Modeling of systems with overflow multi-rate traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 37(1-3), pp. 85-96, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Overflow traffic, Multiservice systems, Kaufman-Roberts recursion |
45 | Hossain Shahriar, Mohammad Zulkernine |
Mutation-Based Testing of Buffer Overflow Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2008, 28 July - 1 August 2008, Turku, Finland, pp. 979-984, 2008, IEEE Computer Society, 978-0-7695-3262-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Mutation-based testing, Vulnerabilities, Buffer overflow |
45 | Kelvin Ku, Thomas E. Hart, Marsha Chechik, David Lie |
A buffer overflow benchmark for software model checkers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASE ![In: 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2007), November 5-9, 2007, Atlanta, Georgia, USA, pp. 389-392, 2007, ACM, 978-1-59593-882-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
model checking, benchmark, buffer overflow, array bounds checking |
45 | Yong-Joon Park, Zhao Zhang, Gyungho Lee |
Microarchitectural Protection Against Stack-Based Buffer Overflow Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Micro ![In: IEEE Micro 26(4), pp. 62-71, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Microarchitectural protection, stack-based, buffer overflow, RAS |
45 | Andreas Brandt 0001, Manfred Brandt |
Individual Overflow and Freed Carried Traffics for a Link with Trunk Reservation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 29(4), pp. 283-308, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
overflow traffic, freed carried traffic, factorial moments, peakedness, two-moment method, circuit switched network, trunk reservation |
45 | Yongsu Park, Yookun Cho |
An Efficient Pointer Protection Scheme to Defend Buffer Overflow Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PARA ![In: Applied Parallel Computing, State of the Art in Scientific Computing, 7th International Workshop, PARA 2004, Lyngby, Denmark, June 20-23, 2004, Revised Selected Papers, pp. 1025-1030, 2004, Springer, 3-540-29067-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
randomization, buffer overflow, system security |
45 | Andrew T. Phillips, Jack S. Eddy Tan |
Exploring security vulnerabilities by exploiting buffer overflow using the MIPS ISA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 34th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2003, Reno, Nevada, USA, February 19-23, 2003, pp. 172-176, 2003, ACM, 1-58113-648-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
security, pedagogy, buffer overflow |
44 | A. Landauro, J. Liénard |
An Overflow Detection and Correction in Digital Filters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 24(12), pp. 1226-1228, 1975. The full citation details ...](Pics/full.jpeg) |
1975 |
DBLP DOI BibTeX RDF |
overflow detection, overflow oscillations, serial-parallel multiplier, Digital filters |
41 | Devang Jariwala, John Lillis |
Trunk decomposition based global routing optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCAD ![In: 2006 International Conference on Computer-Aided Design, ICCAD 2006, San Jose, CA, USA, November 5-9, 2006, pp. 472-479, 2006, ACM, 1-59593-389-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Qian Huang 0003, King-Tim Ko, Villy Bæk Iversen |
An Approximation Method for Multiservice Loss Performance in Hierarchical Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITC ![In: Managing Traffic Performance in Converged Networks, 20th International Teletraffic Congress, ITC20 2007, Ottawa, Canada, June 17-21, 2007, Proceedings, pp. 901-912, 2007, Springer, 978-3-540-72989-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
overlay network, Hierarchical network, overflow |
40 | Wilfred W. K. Lin, Allan K. Y. Wong, Tharam S. Dillon |
A Novel Traffic Independent NNC for Dynamic Buffer Tuning to Shorten the RTT of a TCP Channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITA (2) ![In: Third International Conference on Information Technology and Applications (ICITA 2005), 4-7 July 2005, Sydney, Australia, pp. 647-652, 2005, IEEE Computer Society, 0-7695-2316-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
PIDC, dynamic buffer tuning, traffic pattern independent, buffer overflow, active queue management, Neural Network Controller |
40 | Douglas M. Priest |
Efficient scaling for complex division. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Math. Softw. ![In: ACM Trans. Math. Softw. 30(4), pp. 389-401, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Complex division, underflow, overflow |
40 | Bárbara González-Arévalo |
Performance of a Leaky Bucket System with Long-Range Dependent Input Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Queueing Syst. Theory Appl. ![In: Queueing Syst. Theory Appl. 46(3-4), pp. 439-459, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
time until overflow, flow control, long-range dependence, finite buffer, heavy tails, leaky bucket, fluid queue |
40 | May T. W. Ip, Wilfred W. K. Lin, Allan K. Y. Wong, Tharam S. Dillon, Dianhui Wang |
An Adaptive Buffer Management Algorithm for Enhancing Dependability and Performance in Mobile-Object-Based Real-Time Computing . ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISORC ![In: 4th International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2001), 2-4 May 2001, Magdeburg, Germany, pp. 138-144, 2001, IEEE Computer Society, 0-7695-1089-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
MORC, P+I+D control algorithm, Convergence Algorithm, adaptive, buffer overflow |
40 | Michael Weber, Viren Shah, Chris Ren |
A Case Study in Detecting Software Security Vulnerabilities Using Constraint Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy, pp. 3-13, 2001, IEEE Computer Society, 0-7695-1387-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
static analysis, buffer overflow, software security, software certification |
39 | Bhuvan Middha, Matthew S. Simpson, Rajeev Barua |
MTSS: Multitask stack sharing for embedded systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Embed. Comput. Syst. ![In: ACM Trans. Embed. Comput. Syst. 7(4), pp. 46:1-46:37, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Out-of-memory errors, cactus stack, meshed stack, reliability, data compression, reuse, virtual memory, runtime checks, heap overflow, stack overflow |
38 | Sirisara Chiamwongpaet, Krerk Piromsopa |
The implementation of Secure Canary Word for buffer-overflow protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIT ![In: 2009 IEEE International Conference on Electro/Information Technology, EIT 2009, Windsor, Ontario, Canada, June 7-9, 2009, pp. 56-61, 2009, IEEE, 978-1-4244-3355-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Wei Le, Mary Lou Soffa |
Marple: a demand-driven path-sensitive buffer overflow detector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGSOFT FSE ![In: Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2008, Atlanta, Georgia, USA, November 9-14, 2008, pp. 272-282, 2008, ACM, 978-1-59593-995-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Wei Le, Mary Lou Soffa |
Refining buffer overflow detection via demand-driven path-sensitive analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PASTE ![In: Proceedings of the 7th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering, PASTE'07, San Diego, California, USA, June 13-14, 2007, pp. 63-68, 2007, ACM, 978-1-59593-595-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
path-sensitive, demand-driven, infeasible paths |
38 | João Durães, Henrique Madeira |
A Methodology for the Automated Identification of Buffer Overflow Vulnerabilities in Executable Software Without Source-Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LADC ![In: Dependable Computing, Second Latin-American Symposium, LADC 2005, Salvador, Brazil, October 25-28, 2005, Proceedings, pp. 20-34, 2005, Springer, 3-540-29572-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
38 | Phone Lin, Yi-Bing Lin, Imrich Chlamtac |
Overflow control for UMTS high-speed downlink packet access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 3(2), pp. 524-532, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Ge Zhu, Akhilesh Tyagi |
Protection against Indirect Overflow Attacks on Pointers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, USA, pp. 97-106, 2004, IEEE Computer Society, 0-7695-2117-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Aishwarya Iyer, Lorie M. Liebrock |
Vulnerability Scanning for Buffer Overflow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (2) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 116-117, 2004, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Zili Shao, Chun Xue, Qingfeng Zhuge, Edwin Hsing-Mean Sha, Bin Xiao 0001 |
Security Protection and Checking in Embedded System Integration Against Buffer Overflow Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 409-413, 2004, IEEE Computer Society, 0-7695-2108-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Vahid Tabataba Vakili, Arash Aziminejad, Mohammad Reza Dehbozorgi |
A novel speed-sensitive bidirectional overflow and hand-down resource allocation strategy for hierarchical cellular networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISICT ![In: Proceedings of the 1st Intenational Symposium on Information and Communication Technologies, Dublin, Ireland, September 24-26, 2003, pp. 126-131, 2003, Trinity College Dublin. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
hierarchical cellular structure, speed estimation and segregation, teletraffic performance, resource management |
38 | Yang-Seo Choi, Dong-il Seo, Sung Won Sohn |
A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings, pp. 146-159, 2001, Springer, 3-540-43319-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
38 | Robert B. Cooper, Martin K. Solomon |
The Average Time Until Bucket Overflow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 9(3), pp. 392-408, 1984. The full citation details ...](Pics/full.jpeg) |
1984 |
DBLP DOI BibTeX RDF |
|
37 | Michel Mandjes, Ad Ridder |
Optimal trajectory to overflow in a queue fed by a large number of sources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Queueing Syst. Theory Appl. ![In: Queueing Syst. Theory Appl. 31(1-2), pp. 137-170, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
large deviations asymptotics, queueing theory, buffer overflow, calculus of variations, ATM multiplexers |
33 | Yanheng Zhang, Yue Xu, Chris Chu |
FastRoute3.0: a fast and high quality global router based on virtual capacity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCAD ![In: 2008 International Conference on Computer-Aided Design, ICCAD 2008, San Jose, CA, USA, November 10-13, 2008, pp. 344-349, 2008, IEEE Computer Society, 978-1-4244-2820-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | David Chase, Yossi Lev |
Dynamic circular work-stealing deque. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPAA ![In: SPAA 2005: Proceedings of the 17th Annual ACM Symposium on Parallelism in Algorithms and Architectures, July 18-20, 2005, Las Vegas, Nevada, USA, pp. 21-28, 2005, ACM, 1-58113-986-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
deque, load balancing, lock-free, work stealing |
33 | Shuo Chen 0001, Zbigniew Kalbarczyk, Jun Xu 0003, Ravishankar K. Iyer |
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2003 International Conference on Dependable Systems and Networks (DSN 2003), 22-25 June 2003, San Francisco, CA, USA, Proceedings, pp. 605-614, 2003, IEEE Computer Society, 0-7695-1952-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
data analysis, security vulnerabilities, finite state machine modeling |
33 | Ashok Rathi, Huizhu Lu, George E. Hedrick |
Performance Comparison of Extendible Hashing and Linear Hashing Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGSMALL/PC Symposium ![In: Proceedings of the 1990 ACM SIGSMALL/PC Symposium on Small Systems, March 28-30, 1990. Crystal City, VA, USA, pp. 178-185, 1990, ACM, 0-89791-347-7. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
32 | Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens, Sven Lachmund, Thomas Walter 0001 |
Breaking the memory secrecy assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROSEC ![In: Proceedings of the Second European Workshop on System Security, EUROSEC 2009, Nuremburg, Germany, March 31, 2009, pp. 1-8, 2009, ACM, 978-1-60558-472-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
buffer overread, probabilistic countermeasure, buffer overflow, systems security, bypass |
32 | Shang Ma, Jianhao Hu, Lin Zhang, Xiang Ling 0002 |
An efficient RNS parity checker for moduli set {2 n - 1, 2 n + 1, 22 n + 1} and its applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 51(10), pp. 1563-1571, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
number comparison, sign determination, overflow detection, VLSI, RNS, parity check |
32 | Weiwei Sun 0008, Yongrui Qin, Ping Yu 0001, Zhuoyao Zhang, Zhenying He |
HFilter: Hybrid Finite Automaton Based Stream Filtering for Deep and Recursive XML Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 19th International Conference, DEXA 2008, Turin, Italy, September 1-5, 2008. Proceedings, pp. 566-580, 2008, Springer, 978-3-540-85653-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
XML stream filtering, deep and recursive XML data, hybrid finite automaton, data prefix sharing, memory overflow control |
32 | Dimitar Radev, Elena Rashkova |
Computer simulation of rare event for M/M/1/N queuing system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CompSysTech ![In: Proceedings of the 2007 International Conference on Computer Systems and Technologies, CompSysTech 2007, Rousse, Bulgaria, June 14-15, 2007, pp. 44, 2007, ACM, 978-954-9641-50-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Markov chains, simulation modeling, queuing theory, rare event, overflow probability |
32 | Yongsu Park, Younho Lee, Heeyoul Kim, Gil-Joo Lee, Il-Hee Kim |
Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings, pp. 268-277, 2006, Springer, 3-540-47699-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
computer architecture, computer security, buffer overflow attack |
32 | Yongsu Park, Yong Ho Song, Eul-Gyu Im |
Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 731-732, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
computer architecture, computer security, buffer overflow attack |
32 | Chu Chao, Qin Zhang, Yingke Xie, Chengde Han |
Design of a high performance FFT processor based on FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASP-DAC ![In: Proceedings of the 2005 Conference on Asia South Pacific Design Automation, ASP-DAC 2005, Shanghai, China, January 18-21, 2005, pp. 920-923, 2005, ACM Press, 0-7803-8737-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
FFT processor, overflow control, FPGA, address generation |
32 | Belka Kraimeche, Habiba Skalli |
A frequency-hopping scheme for interference control in a GSM/GPRS network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WMuNeP ![In: WMuNeP'05 - Proceedings of the First ACM Workshop on Wireless Multimedia Networking and Performance Modeling, Montreal, Quebec, Canada, October 13, 2005, pp. 101-105, 2005, ACM, 1-59593-183-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
interference control, GSM, GPRS, frequency hopping, overflow |
32 | Nikolai Joukov, Aditya Kashyap, Gopalan Sivathanu, Erez Zadok |
An electric fence for kernel buffers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
StorageSS ![In: Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, StorageSS 2005, Fairfax, VA, USA, November 11, 2005, pp. 37-43, 2005, ACM, 1-59593-233-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security, file systems, buffer overflow |
32 | Ozcan Ozturk 0002, Ravi Mazumdar, Nikolay B. Likhanov |
Many Sources Asymptotics for Networks with Small Buffers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Queueing Syst. Theory Appl. ![In: Queueing Syst. Theory Appl. 46(1-2), pp. 129-147, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
many sources asymptotics, overflow probabilities, large deviation principle |
32 | Do Young Eun, Ness B. Shroff |
A measurement-analytic approach for QoS estimation in a network based on the dominant time scale. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 11(2), pp. 222-235, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
dominant time scale (DTS), measurements, Gaussian processes, stopping criterion, overflow probability |
32 | Boris Igelnik, Yaakov Kogan, Vladimir Kriman, Debasis Mitra 0001 |
A new computational approach for stochastic fluid models of multiplexers with heterogeneous sources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Queueing Syst. Theory Appl. ![In: Queueing Syst. Theory Appl. 20(1-2), pp. 85-116, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
buffer overflow probability, two-dimensional interpolating polynomials, Fluid models, ATM multiplexing, recursive computation |
32 | Alexander Birman, H. Richard Gail, Sidney L. Hantler, Zvi Rosberg, Moshe Sidi |
An Optimal Service Policy for Buffer Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. ACM ![In: J. ACM 42(3), pp. 641-657, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
gradual input, multiplexor, switch, buffer overflow, parallel queues, service discipline |
31 | Bhuvan Middha, Matthew S. Simpson, Rajeev Barua |
MTSS: multi task stack sharing for embedded systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASES ![In: Proceedings of the 2005 International Conference on Compilers, Architecture, and Synthesis for Embedded Systems, CASES 2005, San Francisco, California, USA, September 24-27, 2005, pp. 191-201, 2005, ACM, 1-59593-149-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
cactus stack, meshed stack, out-of-memory, reliability, reuse, runtime checks, heap overflow, stack overflow |
31 | Carol A. Niznik |
A Quantization Approximation for Modeling Computer Network Nodal Queueing Delay. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 32(3), pp. 245-253, 1983. The full citation details ...](Pics/full.jpeg) |
1983 |
DBLP DOI BibTeX RDF |
staircase function, Average Fractional Overflow, GI/ G1, Peak Measurement Accuracy, Peak Measurement Complexity, Markov Chain, quantization, buffer overflow, queueing system, mean waiting time |
31 | Harvey L. Garner |
Theory of Computer Addition and Overflows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 27(4), pp. 297-301, 1978. The full citation details ...](Pics/full.jpeg) |
1978 |
DBLP DOI BibTeX RDF |
overflow behavior, Additive identity, compute through overflow (CTO), models of computer arithmetic, computer arithmetic, number systems |
30 | Huang-Yu Chen, Chin-Hsiung Hsu, Yao-Wen Chang |
High-performance global routing with fast overflow reduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASP-DAC ![In: Proceedings of the 14th Asia South Pacific Design Automation Conference, ASP-DAC 2009, Yokohama, Japan, January 19-22, 2009, pp. 582-587, 2009, IEEE, 978-1-4244-2748-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Chung-Ping Chung, Tung-Lin Lu, Hui-Chin Yang |
H-Buffer: An Efficient History-Based and Overflow Sharing Transparent Fragment Storage Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (2) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 420-425, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Gang Uk Hwang |
Analysis of Medium Access Delay and Packet Overflow Probability in IEEE 802.11 Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NEW2AN ![In: Next Generation Teletraffic and Wired/Wireless Advanced Networking, 7th International Conference, NEW2AN 2007, St. Petersburg, Russia, September 10-14, 2007, Proceedings, pp. 419-430, 2007, Springer, 978-3-540-74832-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Mariusz Glabowski, Katarzyna Kubasik, Maciej Stasiak |
Modeling of Systems with Overflow Multi-Rate Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICT ![In: Third Advanced International Conference on Telecommunications (AICT 2007), May 13-19, 2007, Mauritius, pp. 6, 2007, IEEE Computer Society, 0-7695-2843-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Seon Wook Kim, Chong-liang Ooi, Rudolf Eigenmann, Babak Falsafi, T. N. Vijaykumar |
Exploiting reference idempotency to reduce speculative storage overflow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Program. Lang. Syst. ![In: ACM Trans. Program. Lang. Syst. 28(5), pp. 942-965, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Idempotent references, compiler-assisted speculative execution, speculation |
30 | Victor F. Nicola, Tatiana S. Zaburnenko |
Efficient simulation of population overflow in parallel queues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: Proceedings of the Winter Simulation Conference WSC 2006, Monterey, California, USA, December 3-6, 2006, pp. 398-403, 2006, IEEE Computer Society, 1-4244-0501-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Koji Inoue |
Energy-security tradeoff in a secure cache architecture against buffer overflow attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGARCH Comput. Archit. News ![In: SIGARCH Comput. Archit. News 33(1), pp. 81-89, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Andrzej Chydzinski, Ryszard Winiarczyk |
Distribution of the First Buffer Overflow Time in a Deterministic Service Time Queue. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 27-30 June 2005, Murcia, Cartagena, Spain, pp. 637-641, 2005, IEEE Computer Society, 0-7695-2373-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Wilfred W. K. Lin, Allan K. Y. Wong, Tharam S. Dillon |
FLC: A Novel Dynamic Buffer Tuner for Shortening Service Roundtrip Time over the Internet by Eliminating User-Level Buffer Overflow on the Fly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APPT ![In: Advanced Parallel Processing Technologies, 6th International Workshop, APPT 2005, Hong Kong, China, October 27-28, 2005, Proceedings, pp. 400-408, 2005, Springer, 3-540-29639-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Stelios Sidiroglou, Giannis Giovanidis, Angelos D. Keromytis |
A Dynamic Mechanism for Recovering from Buffer Overflow Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings, pp. 1-15, 2005, Springer, 3-540-29001-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Archana Pasupulati, Jason Coit, Karl N. Levitt, Shyhtsun Felix Wu, S. H. Li, J. C. Kuo, K. P. Fan |
Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS (1) ![In: Managing Next Generation Convergence Networks and Services, IEEE/IFIP Network Operations and Management Symposium, NOMS 2004, Seoul, Korea, 19-23 April 2004, Proceedings, pp. 235-248, 2004, IEEE, 0-7803-8230-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Alexander A. Kist, Richard J. Harris 0002 |
Cost efficient overflow routing for outbound ISP traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28 - July 1, 2004, Alexandria, Egypt, pp. 876-882, 2004, IEEE Computer Society, 0-7803-8623-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Changwoo Pyo, Byungchul Bae, Taejin Kim, Gyungho Lee |
Run-time Detection of Buffer Overflow Attacks without Explicit Sensor Data Objects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 50-, 2004, IEEE Computer Society, 0-7695-2108-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Lennart Harnefors, Johnny Holmberg, Svante Signell |
Suppression of overflow limit cycles in LDI allpass/lattice filters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (3) ![In: Proceedings of the 1999 International Symposium on Circuits and Systems, ISCAS 1999, Orlando, Florida, USA, May 30 - June 2, 1999, pp. 323-326, 1999, IEEE, 0-7803-5471-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
30 | Per-Åke Larson |
Linear Hashing with Overflow-Handling by Linear Probing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 10(1), pp. 75-89, 1985. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
|
29 | Xinran Wang, Chi-Chun Pan, Peng Liu 0005, Sencun Zhu |
SigFree: A Signature-Free Buffer Overflow Attack Blocker. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 7(1), pp. 65-79, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Intrusion detection, code-injection attacks, buffer overflow attacks |
29 | Krerk Piromsopa, Sirisara Chiamwongpaet |
Secure Bit Enhanced Canary: Hardware Enhanced Buffer-Overflow Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NPC Workshops ![In: IFIP International Conference on Network and Parallel Computing, NPC 2008, Shanghai, China, October 18-21, 2008, Workshop Proceedings, pp. 125-131, 2008, IEEE Computer Society, 978-0-7695-3354-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Security, Protection, Buffer overflow, security kernels, invasive software |
29 | A. B. Dieker, Michel Mandjes |
Fast simulation of overflow probabilities in a queue with Gaussian input. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Model. Comput. Simul. ![In: ACM Trans. Model. Comput. Simul. 16(2), pp. 119-151, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Asymptotic efficiency, queueing theory, importance sampling, large deviations, Gaussian processes, overflow probability |
29 | Changwoo Pyo, Gyungho Lee |
Encoding Function Pointers and Memory Arrangement Checking against Buffer Overflow Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, pp. 25-36, 2002, Springer, 3-540-00164-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
program counter, function pointer encoding, memory arrangement checking, buffer overflow attack |
Displaying result #1 - #100 of 2062 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|