|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 6048 occurrences of 3544 keywords
|
|
|
Results
Found 5956 publication records. Showing 5956 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
19 | Amir Elmishali, Roni Stern, Meir Kalech |
Diagnosing Software System Exploits. |
IEEE Intell. Syst. |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Roger Piqueras Jover |
Security Analysis of SMS as a Second Factor of Authentication: The challenges of multifactor authentication based on SMS, including cellular security deficiencies, SS7 exploits, and SIM swapping. |
ACM Queue |
2020 |
DBLP DOI BibTeX RDF |
|
19 | José Luis Valtierra, Manuel Delgado-Restituto, Rafaella Fiorelli, Ángel Rodríguez-Vázquez |
A Sub- $\mu$ W Reconfigurable Front-End for Invasive Neural Recording That Exploits the Spectral Characteristics of the Wideband Neural Signal. |
IEEE Trans. Circuits Syst. I Fundam. Theory Appl. |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Xuewei Feng, Chuanpu Fu, Qi Li 0002, Kun Sun 0001, Ke Xu 0002 |
Off-Path TCP Exploits of the Mixed IPID Assignment. |
CCS |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Ruixu Liu, Ju Shen, He Wang, Chen Chen 0001, Sen-Ching S. Cheung, Vijayan K. Asari |
Attention Mechanism Exploits Temporal Contexts: Real-Time 3D Human Pose Reconstruction. |
CVPR |
2020 |
DBLP BibTeX RDF |
|
19 | Benjamin Ampel, Sagar Samtani, Hongyi Zhu, Steven Ullman, Hsinchun Chen |
Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach. |
ISI |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Tsvetoslava Vateva-Gurova |
Analysis and Detection of Cache-Based Exploits. |
|
2020 |
RDF |
|
19 | Sebastian-Amadeo Schmolck |
Rechtliche Vorgaben für die Weitergabe und Nutzung von Softwareschwachstellen und Exploits. |
|
2020 |
RDF |
|
19 | Toni Karvonen, Simo Särkkä, Chris J. Oates |
Symmetry exploits for Bayesian cubature methods. |
Stat. Comput. |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Andrey Fedorchenko, Elena Doynikova, Igor V. Kotenko |
Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits. |
J. Univers. Comput. Sci. |
2019 |
DBLP BibTeX RDF |
|
19 | Nicholas J. Higham, Théo Mary |
A New Preconditioner that Exploits Low-Rank Approximations to Factorization Error. |
SIAM J. Sci. Comput. |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Thibaut Stimpfling, Normand Bélanger, J. M. Pierre Langlois, Yvon Savaria |
SHIP: A Scalable High-Performance IPv6 Lookup Algorithm That Exploits Prefix Characteristics. |
IEEE/ACM Trans. Netw. |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Stanislav Dashevskyi, Daniel Ricardo dos Santos, Fabio Massacci, Antonino Sabetta |
TestREx: a framework for repeatable exploits. |
Int. J. Softw. Tools Technol. Transf. |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Le Guan, Chen Cao, Peng Liu 0005, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu 0001, Trent Jaeger |
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM. |
IEEE Trans. Dependable Secur. Comput. |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Xin Zhou, Jianmin Pang |
Expdf: Exploits Detection System Based on Machine-Learning. |
Int. J. Comput. Intell. Syst. |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Ioannis Stellios, Panayiotis Kotzanikolaou, Mihalis Psarakis |
Advanced Persistent Threats and Zero-Day Exploits in Industrial Internet of Things. |
Security and Privacy Trends in the Industrial Internet of Thing |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Da-Yu Kao, Shou-Ching Hsiao, Raylin Tso |
Analyzing WannaCry Ransomware Considering the Weapons and Exploits. |
ICACT |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty |
Revisiting the Security of LPN Based RFID Authentication Protocol and Potential Exploits in Hardware Implementations. |
SPACE |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Mingsong Zhou, Fanping Zeng, Yu Zhang 0086, Chengcheng Lv, Zhao Chen, Guozhu Chen |
Automatic Generation of Capability Leaks' Exploits for Android Applications. |
ICST Workshops |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Matt Goerzen, Elizabeth Anne Watkins, Gabrielle Lim |
Entanglements and Exploits: Sociotechnical Security as an Analytic Framework. |
FOCI @ USENIX Security Symposium |
2019 |
DBLP BibTeX RDF |
|
19 | Shih-Wei Li, John S. Koh, Jason Nieh |
Protecting Cloud Virtual Machines from Hypervisor and Host Operating System Exploits. |
USENIX Security Symposium |
2019 |
DBLP BibTeX RDF |
|
19 | Michael Schwarz 0001, Florian Lackner, Daniel Gruss |
JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits. |
NDSS |
2019 |
DBLP BibTeX RDF |
|
19 | Xunchao Hu, Brian Testa, Heng Yin 0001 |
ChaffyScript: Vulnerability-Agnostic Defense of JavaScript Exploits via Memory Perturbation. |
SecureComm (1) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Eina Hashimoto, Masatsugu Ichino, Hiroshi Yoshiura |
A Re-Identification Strategy Using Machine Learning that Exploits Better Side Data. |
iCAST |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Yue Li |
Finding concurrency exploits on smart contracts. |
ICSE (Companion Volume) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | David Gens |
OS-level Attacks and Defenses: from Software to Hardware-based Exploits. |
|
2019 |
RDF |
|
19 | Guillermo Suarez-Tangil, Santanu Kumar Dash 0001, Pedro García-Teodoro, José Camacho 0001, Lorenzo Cavallaro |
Anomaly-based exploratory analysis and detection of exploits in android mediaserver. |
IET Inf. Secur. |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Chin-Chia Michael Yeh, Yan Zhu 0014, Liudmila Ulanova, Nurjahan Begum, Yifei Ding, Hoang Anh Dau, Zachary Zimmerman, Diego Furtado Silva, Abdullah Mueen 0001, Eamonn J. Keogh |
Time series joins, motifs, discords and shapelets: a unifying view that exploits the matrix profile. |
Data Min. Knowl. Discov. |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Adrian Calma, Tobias Reitmaier, Bernhard Sick |
Semi-supervised active learning for support vector machines: A novel approach that exploits structure information in data. |
Inf. Sci. |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Eman M. Hammad, Ahmed Mostafa Khalil, Abdallah K. Farraj, Deepa Kundur, Reza Iravani |
A Class of Switching Exploits Based on Inter-Area Oscillations. |
IEEE Trans. Smart Grid |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Yue Cao 0003, Zhiyun Qian, Zhongjie Wang 0002, Tuan Dao, Srikanth V. Krishnamurthy, Lisa M. Marvel |
Off-Path TCP Exploits of the Challenge ACK Global Rate Limit. |
IEEE/ACM Trans. Netw. |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Alex Grieve, Michael Davies, Phillip H. Jones, Joseph Zambreno |
ARMOR: A Recompilation and Instrumentation-Free Monitoring Architecture for Detecting Memory Exploits. |
IEEE Trans. Computers |
2018 |
DBLP DOI BibTeX RDF |
|
19 | N. Sasikaladevi, K. Geetha, K. N. Venkata Srinivas |
A multi-tier security system (SAIL) for protecting audio signals from malicious exploits. |
Int. J. Speech Technol. |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Amara Dinesh Kumar, Koti Naga Renu Chebrolu, R. Vinayakumar, Soman K. P |
A Brief Survey on Autonomous Vehicle Possible Attacks, Exploits and Vulnerabilities. |
CoRR |
2018 |
DBLP BibTeX RDF |
|
19 | Pranava Swaroop Madhyastha, Josiah Wang, Lucia Specia |
End-to-end Image Captioning Exploits Multimodal Distributional Similarity. |
CoRR |
2018 |
DBLP BibTeX RDF |
|
19 | Huasong Meng, Vrizlynn L. L. Thing, Yao Cheng, Zhongmin Dai, Li Zhang |
A survey of Android exploits in the wild. |
Comput. Secur. |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Tobias May |
Robust Speech Dereverberation With a Neural Network-Based Post-Filter That Exploits Multi-Conditional Training of Binaural Cues. |
IEEE ACM Trans. Audio Speech Lang. Process. |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Daiping Liu, Mingwei Zhang 0005, Haining Wang |
A Robust and Efficient Defense against Use-after-Free Exploits via Concurrent Pointer Sweeping. |
CCS |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Tiantian Tan, Baosheng Wang, Zhou Xu, Yong Tang |
The New Progress in the Research of Binary Vulnerability Exploits. |
ICCCS (2) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Pal-Stefan Murvay, Bogdan Groza |
Practical Security Exploits of the FlexRay In-Vehicle Communication Protocol. |
CRiSIS |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Miah A. Halim, Robert Rantz, Qian Zhang, Lei Gu, Ken Yang, Shad Roundy |
Modeling and Experimental Analysis of a Wearable Energy Harvester that Exploits Human-Body Motion. |
IEEE SENSORS |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Caroline Trippel, Daniel Lustig, Margaret Martonosi |
CheckMate: Automated Synthesis of Hardware Exploits and Security Litmus Tests. |
MICRO |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Siddhartha Verma, Thomas Gruber 0004, Peter P. Puschner, Christoph Schmittner, Erwin Schoitsch |
A Quantitative Approach for the Likelihood of Exploits of System Vulnerabilities. |
SAFECOMP Workshops |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Marco Angelini, Graziano Blasilli, Pietro Borrello, Emilio Coppa, Daniele Cono D'Elia, Serena Ferracci, Simone Lenti, Giuseppe Santucci |
ROPMate: Visually Assisting the Creation of ROP-based Exploits. |
VizSEC |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Guangliang Yang 0001, Jeff Huang 0001, Guofei Gu |
Automated Generation of Event-Oriented Exploits in Android Hybrid Apps. |
NDSS |
2018 |
DBLP BibTeX RDF |
|
19 | Roman Rädle, Hans-Christian Jetter, Jonathan Fischer, Inti Gabriel, Clemens Nylandsted Klokmose, Harald Reiterer, Christian Holz 0001 |
PolarTrack: Optical Outside-In Device Tracking that Exploits Display Polarization. |
CHI |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Pranava Swaroop Madhyastha, Josiah Wang, Lucia Specia |
End-to-end Image Captioning Exploits Distributional Similarity in Multimodal Space. |
BlackboxNLP@EMNLP |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Alexander Reinthal, Eleftherios Lef Filippakis, Magnus Almgren |
Data Modelling for Predicting Exploits. |
NordSec |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Shachee Mishra, Michalis Polychronakis |
Shredder: Breaking Exploits through API Specialization. |
ACSAC |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Pranava Swaroop Madhyastha, Josiah Wang, Lucia Specia |
End-to-end Image Captioning Exploits Distributional Similarity in Multimodal Space. |
BMVC |
2018 |
DBLP BibTeX RDF |
|
19 | El Habib Boudjema |
Defense against software exploits. (Défense contre les attaques de logiciels). |
|
2018 |
RDF |
|
19 | Yasue Kishino, Yutaka Yanagisawa, Yoshinari Shirai, Shin Mizutani, Takayuki Suyama, Futoshi Naya |
Agile Environmental Monitoring Exploits Rapid Prototyping and In Situ Adaptation. |
IEEE Pervasive Comput. |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Nayeem Islam, Saumitra Das, Yin Chen |
On-Device Mobile Phone Security Exploits Machine Learning. |
IEEE Pervasive Comput. |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Jukka Ruohonen |
Classifying Web Exploits with Topic Modeling. |
CoRR |
2017 |
DBLP BibTeX RDF |
|
19 | Stanislav Dashevskyi, Daniel Ricardo dos Santos, Fabio Massacci, Antonino Sabetta |
TestREx: a Framework for Repeatable Exploits. |
CoRR |
2017 |
DBLP BibTeX RDF |
|
19 | Thibaut Stimpfling, Normand Bélanger, J. M. Pierre Langlois, Yvon Savaria |
SHIP: A Scalable High-performance IPv6 Lookup Algorithm that Exploits Prefix Characteristics. |
CoRR |
2017 |
DBLP BibTeX RDF |
|
19 | Hocheol Shin, Dohyun Kim 0004, Yujin Kwon, Yongdae Kim |
Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications. |
IACR Cryptol. ePrint Arch. |
2017 |
DBLP BibTeX RDF |
|
19 | Run Wang, Pei Liu, Lei Zhao, Yueqiang Cheng, Lina Wang 0001 |
deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level. |
J. Syst. Softw. |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Dusan Repel, Johannes Kinder, Lorenzo Cavallaro |
Modular Synthesis of Heap Exploits. |
PLAS@CCS |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Subhojeet Mukherjee, Noah Cain, Jacob Walker, David White, Indrajit Ray, Indrakshi Ray |
POSTER: PenJ1939: An Interactive Framework for Design and Dissemination of Exploits for Commercial Vehicles. |
CCS |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Wei You, Peiyuan Zong, Kai Chen 0012, XiaoFeng Wang 0001, Xiaojing Liao, Pan Bian, Bin Liang 0002 |
SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits. |
CCS |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Victor C. Valgenti, Ya-Wen Lin, Atsuhiro Suzuki, Min Sik Kim |
Simulating Exploits for the Creation and Refinement of Detection Signatures. |
MASCOTS |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Yu Cai 0001, Saugata Ghose, Yixin Luo, Ken Mai, Onur Mutlu, Erich F. Haratsch |
Vulnerabilities in MLC NAND Flash Memory Programming: Experimental Analysis, Exploits, and Mitigation Techniques. |
HPCA |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Gustavo K. Contreras, Adib Nahiyan, Swarup Bhunia, Domenic Forte, Mark M. Tehranipoor |
Security vulnerability analysis of design-for-test exploits for asset protection in SoCs. |
ASP-DAC |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Mohammed Almukaynizi, Eric Nunes, Krishna Dharaiya, Manoj Senguttuvan, Jana Shakarian, Paulo Shakarian |
Proactive identification of exploits in the wild through vulnerability mentions online. |
CyCon U.S. |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Ioannis Gasparis, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy |
Detecting Android Root Exploits by Learning from Root Providers. |
USENIX Security Symposium |
2017 |
DBLP BibTeX RDF |
|
19 | Christina Leuker, Timothy J. Pleskac, Thorsten Pachur, Ralph Hertwig |
How the Mind Exploits Risk-Reward Structures in Decisions under Risk. |
CogSci |
2017 |
DBLP BibTeX RDF |
|
19 | Joshua Garcia, Mahmoud Hammad, Negar Ghorbani, Sam Malek |
Automatic generation of inter-component communication exploits for Android applications. |
ESEC/SIGSOFT FSE |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Christian Giovanelli, Xin Liu 0020, Seppo A. Sierla, Valeriy Vyatkin, Ryutaro Ichise |
Towards an aggregator that exploits big data to bid on frequency containment reserve market. |
IECON |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Marcus Paul Gutierrez, Christopher Kiekintveld |
Adapting Honeypot Configurations to Detect Evolving Exploits. |
AAAI Workshops |
2017 |
DBLP BibTeX RDF |
|
19 | Jukka Ruohonen |
Classifying Web Exploits with Topic Modeling. |
DEXA Workshops |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Mingyu Guo, Hideaki Hata, Muhammad Ali Babar 0001 |
Optimizing Affine Maximizer Auctions via Linear Programming: An Application to Revenue Maximizing Mechanism Design for Zero-Day Exploits Markets. |
PRIMA |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Tiffany Bao, Ruoyu Wang 0001, Yan Shoshitaishvili, David Brumley |
Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits. |
IEEE Symposium on Security and Privacy |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Hocheol Shin, Dohyun Kim 0004, Yujin Kwon, Yongdae Kim |
Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications. |
CHES |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Marcus Gutierrez, Christopher Kiekintveld |
Adapting with Honeypot Configurations to Detect Evolving Exploits. |
AAMAS |
2017 |
DBLP BibTeX RDF |
|
19 | William W. Hager, Hongchao Zhang |
Projection onto a Polyhedron that Exploits Sparsity. |
SIAM J. Optim. |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Artem Napov, Xiaoye S. Li |
An algebraic multifrontal preconditioner that exploits the low-rank property. |
Numer. Linear Algebra Appl. |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Mauro Conti, Stephen Crane, Tommaso Frassetto, Andrei Homescu, Georg Koppen, Per Larsen, Christopher Liebchen, Mike Perry, Ahmad-Reza Sadeghi |
Selfrando: Securing the Tor Browser against De-anonymization Exploits. |
Proc. Priv. Enhancing Technol. |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Eunyoung Kim, Jongsub Moon |
A new approach to deploying private mobile network exploits. |
J. Supercomput. |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Roger Piqueras Jover |
LTE security, protocol exploits and location tracking experimentation with low-cost software radio. |
CoRR |
2016 |
DBLP BibTeX RDF |
|
19 | Tobias Reitmaier, Adrian Calma, Bernhard Sick |
Semi-Supervised Active Learning for Support Vector Machines: A Novel Approach that Exploits Structure Information in Data. |
CoRR |
2016 |
DBLP BibTeX RDF |
|
19 | Marty J. Wolf, Nir Fresco |
Ethics of the software vulnerabilities and exploits market. |
Inf. Soc. |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Peng Zhou 0002, Xiaojing Gu, Rocky K. C. Chang |
Harvesting File Download Exploits in the Web: A Hacker's View. |
Comput. J. |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Alexander Bolshev, Jason Larsen, Marina Krotofil, Reid Wightman |
A Rising Tide: Design Exploits in Industrial Control Systems. |
WOOT |
2016 |
DBLP BibTeX RDF |
|
19 | Sergey Bratus, Travis Goodspeed, Ange Albertini, Debanjum S. Solanky |
Fillory of PHY: Toward a Periodic Table of Signal Corruption Exploits and Polyglots in Digital Radio. |
WOOT |
2016 |
DBLP BibTeX RDF |
|
19 | Yue Cao 0003, Zhiyun Qian, Zhongjie Wang 0002, Tuan Dao, Srikanth V. Krishnamurthy, Lisa M. Marvel |
Off-Path TCP Exploits: Global Rate Limit Considered Dangerous. |
USENIX Security Symposium |
2016 |
DBLP BibTeX RDF |
|
19 | Wei Xie, Yong Chen 0001, Philip C. Roth |
Parallel-DFTL: A Flash Translation Layer That Exploits Internal Parallelism in Solid State Drives. |
NAS |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Olgierd Pieczul, Simon N. Foley |
Runtime Detection of Zero-Day Vulnerability Exploits in Contemporary Software Systems. |
DBSec |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Xunchao Hu, Aravind Prakash, Jinghan Wang, Rundong Zhou, Yao Cheng, Heng Yin 0001 |
Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary Analysis. |
RAID |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Takeshi Kano, Kotaro Yasui, Dai Owaki, Akio Ishiguro |
Decentralized Control Scheme for Myriapod Locomotion That Exploits Local Force Feedback. |
Living Machines |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Mingyu Guo, Hideaki Hata, Muhammad Ali Babar 0001 |
Revenue Maximizing Markets for Zero-Day Exploits. |
PRIMA |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Tingting Li 0001, Chris Hankin |
Effective Defence Against Zero-Day Exploits Using Bayesian Networks. |
CRITIS |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Tomohiro Ishikawa, Hiroshi Hasegawa, Suresh Subramaniam 0001, Ken-ichi Sato |
A compact OXC node architecture that exploits dynamic path bundling and routing. |
ONDM |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Sampsa Rauti, Samuel Laurén, Joni Uitto, Shohreh Hosseinzadeh, Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen |
A Survey on Internal Interfaces Used by Exploits and Implications on Interface Diversification. |
NordSec |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Hannes Holm, Teodor Sommestad |
SVED: Scanning, Vulnerabilities, Exploits and Detection. |
MILCOM |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen |
Trading exploits online: A preliminary case study. |
RCIS |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Gildo Torres, Chen Liu 0001 |
Can Data-Only Exploits be Detected at Runtime Using Hardware Events?: A Case Study of the Heartbleed Vulnerability. |
HASP@ISCA |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Murat Gul, Muhammed Ali Aydin |
Exploits in information security. |
SIU |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Chengyu Song |
Preventing exploits against memory corruption vulnerabilities. |
|
2016 |
RDF |
|
19 | Ch. Sanjeev Kumar Das |
Hardware-assisted online defense against malware and exploits |
|
2016 |
DOI RDF |
|
Displaying result #101 - #200 of 5956 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|