|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 6048 occurrences of 3544 keywords
|
|
|
Results
Found 5956 publication records. Showing 5956 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
19 | Amir Elmishali, Roni Stern, Meir Kalech |
Diagnosing Software System Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Intell. Syst. ![In: IEEE Intell. Syst. 35(6), pp. 7-15, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Roger Piqueras Jover |
Security Analysis of SMS as a Second Factor of Authentication: The challenges of multifactor authentication based on SMS, including cellular security deficiencies, SS7 exploits, and SIM swapping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Queue ![In: ACM Queue 18(4), pp. 37-60, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | José Luis Valtierra, Manuel Delgado-Restituto, Rafaella Fiorelli, Ángel Rodríguez-Vázquez |
A Sub- $\mu$ W Reconfigurable Front-End for Invasive Neural Recording That Exploits the Spectral Characteristics of the Wideband Neural Signal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. I Fundam. Theory Appl. ![In: IEEE Trans. Circuits Syst. I Fundam. Theory Appl. 67-I(5), pp. 1426-1437, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Xuewei Feng, Chuanpu Fu, Qi Li 0002, Kun Sun 0001, Ke Xu 0002 |
Off-Path TCP Exploits of the Mixed IPID Assignment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020, pp. 1323-1335, 2020, ACM, 978-1-4503-7089-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Ruixu Liu, Ju Shen, He Wang, Chen Chen 0001, Sen-Ching S. Cheung, Vijayan K. Asari |
Attention Mechanism Exploits Temporal Contexts: Real-Time 3D Human Pose Reconstruction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVPR ![In: 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2020, Seattle, WA, USA, June 13-19, 2020, pp. 5063-5072, 2020, Computer Vision Foundation / IEEE, 978-1-7281-7168-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
19 | Benjamin Ampel, Sagar Samtani, Hongyi Zhu, Steven Ullman, Hsinchun Chen |
Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2020, Arlington, VA, USA, November 9-10, 2020, pp. 1-6, 2020, IEEE, 978-1-7281-8800-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Tsvetoslava Vateva-Gurova |
Analysis and Detection of Cache-Based Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2020 |
RDF |
|
19 | Sebastian-Amadeo Schmolck |
Rechtliche Vorgaben für die Weitergabe und Nutzung von Softwareschwachstellen und Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2020 |
RDF |
|
19 | Toni Karvonen, Simo Särkkä, Chris J. Oates |
Symmetry exploits for Bayesian cubature methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Stat. Comput. ![In: Stat. Comput. 29(6), pp. 1231-1248, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Andrey Fedorchenko, Elena Doynikova, Igor V. Kotenko |
Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Univers. Comput. Sci. ![In: J. Univers. Comput. Sci. 25(9), pp. 1043-1065, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
19 | Nicholas J. Higham, Théo Mary |
A New Preconditioner that Exploits Low-Rank Approximations to Factorization Error. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIAM J. Sci. Comput. ![In: SIAM J. Sci. Comput. 41(1), pp. A59-A82, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Thibaut Stimpfling, Normand Bélanger, J. M. Pierre Langlois, Yvon Savaria |
SHIP: A Scalable High-Performance IPv6 Lookup Algorithm That Exploits Prefix Characteristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 27(4), pp. 1529-1542, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Stanislav Dashevskyi, Daniel Ricardo dos Santos, Fabio Massacci, Antonino Sabetta |
TestREx: a framework for repeatable exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Softw. Tools Technol. Transf. ![In: Int. J. Softw. Tools Technol. Transf. 21(1), pp. 105-119, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Le Guan, Chen Cao, Peng Liu 0005, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu 0001, Trent Jaeger |
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 16(3), pp. 438-453, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Xin Zhou, Jianmin Pang |
Expdf: Exploits Detection System Based on Machine-Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Comput. Intell. Syst. ![In: Int. J. Comput. Intell. Syst. 12(2), pp. 1019-1028, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Ioannis Stellios, Panayiotis Kotzanikolaou, Mihalis Psarakis |
Advanced Persistent Threats and Zero-Day Exploits in Industrial Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Privacy Trends in the Industrial Internet of Thing ![In: Security and Privacy Trends in the Industrial Internet of Things, pp. 47-68, 2019, Springer, 978-3-030-12329-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Da-Yu Kao, Shou-Ching Hsiao, Raylin Tso |
Analyzing WannaCry Ransomware Considering the Weapons and Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICACT ![In: 21st International Conference on Advanced Communication Technology, ICACT 2019, Pyeongchang, South Korea, February 17-20, 2019, pp. 1098-1107, 2019, IEEE, 979-11-88428-02-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty |
Revisiting the Security of LPN Based RFID Authentication Protocol and Potential Exploits in Hardware Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPACE ![In: Security, Privacy, and Applied Cryptography Engineering - 9th International Conference, SPACE 2019, Gandhinagar, India, December 3-7, 2019, Proceedings, pp. 214-230, 2019, Springer, 978-3-030-35868-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Mingsong Zhou, Fanping Zeng, Yu Zhang 0086, Chengcheng Lv, Zhao Chen, Guozhu Chen |
Automatic Generation of Capability Leaks' Exploits for Android Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICST Workshops ![In: 2019 IEEE International Conference on Software Testing, Verification and Validation Workshops, ICST Workshops 2019, Xi'an, China, April 22-23, 2019, pp. 291-295, 2019, IEEE, 978-1-7281-0888-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Matt Goerzen, Elizabeth Anne Watkins, Gabrielle Lim |
Entanglements and Exploits: Sociotechnical Security as an Analytic Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCI @ USENIX Security Symposium ![In: 9th USENIX Workshop on Free and Open Communications on the Internet, FOCI 2019, Santa Clara, CA, USA, August 13, 2019., 2019, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
19 | Shih-Wei Li, John S. Koh, Jason Nieh |
Protecting Cloud Virtual Machines from Hypervisor and Host Operating System Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019., pp. 1357-1374, 2019, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
19 | Michael Schwarz 0001, Florian Lackner, Daniel Gruss |
JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019, 2019, The Internet Society, 1-891562-55-X. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
19 | Xunchao Hu, Brian Testa, Heng Yin 0001 |
ChaffyScript: Vulnerability-Agnostic Defense of JavaScript Exploits via Memory Perturbation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm (1) ![In: Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I, pp. 191-213, 2019, Springer, 978-3-030-37227-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Eina Hashimoto, Masatsugu Ichino, Hiroshi Yoshiura |
A Re-Identification Strategy Using Machine Learning that Exploits Better Side Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iCAST ![In: IEEE 10th International Conference on Awareness Science and Technology, iCAST 2019, Morioka, Japan, October 23-25, 2019, pp. 1-8, 2019, IEEE, 978-1-7281-3821-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Yue Li |
Finding concurrency exploits on smart contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE (Companion Volume) ![In: Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, ICSE 2019, Montreal, QC, Canada, May 25-31, 2019., pp. 144-146, 2019, IEEE / ACM, 978-1-7281-1764-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | David Gens |
OS-level Attacks and Defenses: from Software to Hardware-based Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2019 |
RDF |
|
19 | Guillermo Suarez-Tangil, Santanu Kumar Dash 0001, Pedro García-Teodoro, José Camacho 0001, Lorenzo Cavallaro |
Anomaly-based exploratory analysis and detection of exploits in android mediaserver. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 12(5), pp. 404-413, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Chin-Chia Michael Yeh, Yan Zhu 0014, Liudmila Ulanova, Nurjahan Begum, Yifei Ding, Hoang Anh Dau, Zachary Zimmerman, Diego Furtado Silva, Abdullah Mueen 0001, Eamonn J. Keogh |
Time series joins, motifs, discords and shapelets: a unifying view that exploits the matrix profile. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Min. Knowl. Discov. ![In: Data Min. Knowl. Discov. 32(1), pp. 83-123, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Adrian Calma, Tobias Reitmaier, Bernhard Sick |
Semi-supervised active learning for support vector machines: A novel approach that exploits structure information in data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 456, pp. 13-33, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Eman M. Hammad, Ahmed Mostafa Khalil, Abdallah K. Farraj, Deepa Kundur, Reza Iravani |
A Class of Switching Exploits Based on Inter-Area Oscillations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Smart Grid ![In: IEEE Trans. Smart Grid 9(5), pp. 4659-4668, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Yue Cao 0003, Zhiyun Qian, Zhongjie Wang 0002, Tuan Dao, Srikanth V. Krishnamurthy, Lisa M. Marvel |
Off-Path TCP Exploits of the Challenge ACK Global Rate Limit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 26(2), pp. 765-778, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Alex Grieve, Michael Davies, Phillip H. Jones, Joseph Zambreno |
ARMOR: A Recompilation and Instrumentation-Free Monitoring Architecture for Detecting Memory Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 67(8), pp. 1092-1104, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | N. Sasikaladevi, K. Geetha, K. N. Venkata Srinivas |
A multi-tier security system (SAIL) for protecting audio signals from malicious exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Speech Technol. ![In: Int. J. Speech Technol. 21(2), pp. 319-332, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Amara Dinesh Kumar, Koti Naga Renu Chebrolu, R. Vinayakumar, Soman K. P |
A Brief Survey on Autonomous Vehicle Possible Attacks, Exploits and Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1810.04144, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
19 | Pranava Swaroop Madhyastha, Josiah Wang, Lucia Specia |
End-to-end Image Captioning Exploits Multimodal Distributional Similarity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1809.04144, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
19 | Huasong Meng, Vrizlynn L. L. Thing, Yao Cheng, Zhongmin Dai, Li Zhang |
A survey of Android exploits in the wild. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 76, pp. 71-91, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Tobias May |
Robust Speech Dereverberation With a Neural Network-Based Post-Filter That Exploits Multi-Conditional Training of Binaural Cues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE ACM Trans. Audio Speech Lang. Process. ![In: IEEE ACM Trans. Audio Speech Lang. Process. 26(2), pp. 406-414, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Daiping Liu, Mingwei Zhang 0005, Haining Wang |
A Robust and Efficient Defense against Use-after-Free Exploits via Concurrent Pointer Sweeping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018, pp. 1635-1648, 2018, ACM, 978-1-4503-5693-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Tiantian Tan, Baosheng Wang, Zhou Xu, Yong Tang |
The New Progress in the Research of Binary Vulnerability Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCS (2) ![In: Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part II, pp. 277-286, 2018, Springer, 978-3-030-00008-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Pal-Stefan Murvay, Bogdan Groza |
Practical Security Exploits of the FlexRay In-Vehicle Communication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRiSIS ![In: Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers, pp. 172-187, 2018, Springer, 978-3-030-12142-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Miah A. Halim, Robert Rantz, Qian Zhang, Lei Gu, Ken Yang, Shad Roundy |
Modeling and Experimental Analysis of a Wearable Energy Harvester that Exploits Human-Body Motion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SENSORS ![In: 2018 IEEE SENSORS, New Delhi, India, October 28-31, 2018, pp. 1-4, 2018, IEEE, 978-1-5386-4708-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Caroline Trippel, Daniel Lustig, Margaret Martonosi |
CheckMate: Automated Synthesis of Hardware Exploits and Security Litmus Tests. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICRO ![In: 51st Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 2018, Fukuoka, Japan, October 20-24, 2018, pp. 947-960, 2018, IEEE Computer Society, 978-1-5386-6240-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Siddhartha Verma, Thomas Gruber 0004, Peter P. Puschner, Christoph Schmittner, Erwin Schoitsch |
A Quantitative Approach for the Likelihood of Exploits of System Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP Workshops ![In: Computer Safety, Reliability, and Security - SAFECOMP 2018 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, Västerås, Sweden, September 18, 2018, Proceedings, pp. 177-189, 2018, Springer, 978-3-319-99228-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Marco Angelini, Graziano Blasilli, Pietro Borrello, Emilio Coppa, Daniele Cono D'Elia, Serena Ferracci, Simone Lenti, Giuseppe Santucci |
ROPMate: Visually Assisting the Creation of ROP-based Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 15th IEEE Symposium on Visualization for Cyber Security, VizSec 2018, Berlin, Germany, October 22, 2018, pp. 1-8, 2018, IEEE, 978-1-5386-8194-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Guangliang Yang 0001, Jeff Huang 0001, Guofei Gu |
Automated Generation of Event-Oriented Exploits in Android Hybrid Apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018, 2018, The Internet Society. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
19 | Roman Rädle, Hans-Christian Jetter, Jonathan Fischer, Inti Gabriel, Clemens Nylandsted Klokmose, Harald Reiterer, Christian Holz 0001 |
PolarTrack: Optical Outside-In Device Tracking that Exploits Display Polarization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, CHI 2018, Montreal, QC, Canada, April 21-26, 2018, pp. 497, 2018, ACM, 978-1-4503-5620-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Pranava Swaroop Madhyastha, Josiah Wang, Lucia Specia |
End-to-end Image Captioning Exploits Distributional Similarity in Multimodal Space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BlackboxNLP@EMNLP ![In: Proceedings of the Workshop: Analyzing and Interpreting Neural Networks for NLP, BlackboxNLP@EMNLP 2018, Brussels, Belgium, November 1, 2018, pp. 381-383, 2018, Association for Computational Linguistics, 978-1-948087-71-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Alexander Reinthal, Eleftherios Lef Filippakis, Magnus Almgren |
Data Modelling for Predicting Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordSec ![In: Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings, pp. 336-351, 2018, Springer, 978-3-030-03637-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Shachee Mishra, Michalis Polychronakis |
Shredder: Breaking Exploits through API Specialization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018, pp. 1-16, 2018, ACM, 978-1-4503-6569-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Pranava Swaroop Madhyastha, Josiah Wang, Lucia Specia |
End-to-end Image Captioning Exploits Distributional Similarity in Multimodal Space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BMVC ![In: British Machine Vision Conference 2018, BMVC 2018, Newcastle, UK, September 3-6, 2018, pp. 306, 2018, BMVA Press. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
19 | El Habib Boudjema |
Defense against software exploits. (Défense contre les attaques de logiciels). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2018 |
RDF |
|
19 | Yasue Kishino, Yutaka Yanagisawa, Yoshinari Shirai, Shin Mizutani, Takayuki Suyama, Futoshi Naya |
Agile Environmental Monitoring Exploits Rapid Prototyping and In Situ Adaptation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Pervasive Comput. ![In: IEEE Pervasive Comput. 16(2), pp. 61-71, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Nayeem Islam, Saumitra Das, Yin Chen |
On-Device Mobile Phone Security Exploits Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Pervasive Comput. ![In: IEEE Pervasive Comput. 16(2), pp. 92-96, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Jukka Ruohonen |
Classifying Web Exploits with Topic Modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1710.05561, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
19 | Stanislav Dashevskyi, Daniel Ricardo dos Santos, Fabio Massacci, Antonino Sabetta |
TestREx: a Framework for Repeatable Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1709.03084, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
19 | Thibaut Stimpfling, Normand Bélanger, J. M. Pierre Langlois, Yvon Savaria |
SHIP: A Scalable High-performance IPv6 Lookup Algorithm that Exploits Prefix Characteristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1711.09155, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
19 | Hocheol Shin, Dohyun Kim 0004, Yujin Kwon, Yongdae Kim |
Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 613, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
19 | Run Wang, Pei Liu, Lei Zhao, Yueqiang Cheng, Lina Wang 0001 |
deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Softw. ![In: J. Syst. Softw. 124, pp. 153-168, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Dusan Repel, Johannes Kinder, Lorenzo Cavallaro |
Modular Synthesis of Heap Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS@CCS ![In: Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2017, Dallas, TX, USA, October 30, 2017, pp. 25-35, 2017, ACM, 978-1-4503-5099-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Subhojeet Mukherjee, Noah Cain, Jacob Walker, David White, Indrajit Ray, Indrakshi Ray |
POSTER: PenJ1939: An Interactive Framework for Design and Dissemination of Exploits for Commercial Vehicles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017, pp. 2559-2561, 2017, ACM, 978-1-4503-4946-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Wei You, Peiyuan Zong, Kai Chen 0012, XiaoFeng Wang 0001, Xiaojing Liao, Pan Bian, Bin Liang 0002 |
SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017, pp. 2139-2154, 2017, ACM, 978-1-4503-4946-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Victor C. Valgenti, Ya-Wen Lin, Atsuhiro Suzuki, Min Sik Kim |
Simulating Exploits for the Creation and Refinement of Detection Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MASCOTS ![In: 25th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, MASCOTS 2017, Banff, AB, Canada, September 20-22, 2017, pp. 150-156, 2017, IEEE Computer Society, 978-1-5386-2764-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Yu Cai 0001, Saugata Ghose, Yixin Luo, Ken Mai, Onur Mutlu, Erich F. Haratsch |
Vulnerabilities in MLC NAND Flash Memory Programming: Experimental Analysis, Exploits, and Mitigation Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCA ![In: 2017 IEEE International Symposium on High Performance Computer Architecture, HPCA 2017, Austin, TX, USA, February 4-8, 2017, pp. 49-60, 2017, IEEE Computer Society, 978-1-5090-4985-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Gustavo K. Contreras, Adib Nahiyan, Swarup Bhunia, Domenic Forte, Mark M. Tehranipoor |
Security vulnerability analysis of design-for-test exploits for asset protection in SoCs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASP-DAC ![In: 22nd Asia and South Pacific Design Automation Conference, ASP-DAC 2017, Chiba, Japan, January 16-19, 2017, pp. 617-622, 2017, IEEE, 978-1-5090-1558-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Mohammed Almukaynizi, Eric Nunes, Krishna Dharaiya, Manoj Senguttuvan, Jana Shakarian, Paulo Shakarian |
Proactive identification of exploits in the wild through vulnerability mentions online. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyCon U.S. ![In: 2017 International Conference on Cyber Conflict, CyCon U.S. 2017, Washington, DC, USA, November 7-8, 2017, pp. 82-88, 2017, IEEE Computer Society, 978-1-5386-2379-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Ioannis Gasparis, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy |
Detecting Android Root Exploits by Learning from Root Providers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16-18, 2017., pp. 1129-1144, 2017, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
19 | Christina Leuker, Timothy J. Pleskac, Thorsten Pachur, Ralph Hertwig |
How the Mind Exploits Risk-Reward Structures in Decisions under Risk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CogSci ![In: Proceedings of the 39th Annual Meeting of the Cognitive Science Society, CogSci 2017, London, UK, 16-29 July 2017, 2017, cognitivesciencesociety.org, 978-0-9911967-6-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
19 | Joshua Garcia, Mahmoud Hammad, Negar Ghorbani, Sam Malek |
Automatic generation of inter-component communication exploits for Android applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEC/SIGSOFT FSE ![In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, ESEC/FSE 2017, Paderborn, Germany, September 4-8, 2017, pp. 661-671, 2017, ACM, 978-1-4503-5105-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Christian Giovanelli, Xin Liu 0020, Seppo A. Sierla, Valeriy Vyatkin, Ryutaro Ichise |
Towards an aggregator that exploits big data to bid on frequency containment reserve market. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IECON ![In: IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29 - November 1, 2017, pp. 7514-7519, 2017, IEEE, 978-1-5386-1127-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Marcus Paul Gutierrez, Christopher Kiekintveld |
Adapting Honeypot Configurations to Detect Evolving Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Workshops ![In: The Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, Saturday, February 4-9, 2017, San Francisco, California, USA, 2017, AAAI Press. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
19 | Jukka Ruohonen |
Classifying Web Exploits with Topic Modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 28th International Workshop on Database and Expert Systems Applications, DEXA 2017 Workshops, Lyon, France, August 28-31, 2017, pp. 93-97, 2017, IEEE Computer Society, 978-1-5386-1051-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Mingyu Guo, Hideaki Hata, Muhammad Ali Babar 0001 |
Optimizing Affine Maximizer Auctions via Linear Programming: An Application to Revenue Maximizing Mechanism Design for Zero-Day Exploits Markets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRIMA ![In: PRIMA 2017: Principles and Practice of Multi-Agent Systems - 20th International Conference, Nice, France, October 30 - November 3, 2017, Proceedings, pp. 280-292, 2017, Springer, 978-3-319-69130-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Tiffany Bao, Ruoyu Wang 0001, Yan Shoshitaishvili, David Brumley |
Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017, pp. 824-839, 2017, IEEE Computer Society, 978-1-5090-5533-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Hocheol Shin, Dohyun Kim 0004, Yujin Kwon, Yongdae Kim |
Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings, pp. 445-467, 2017, Springer, 978-3-319-66786-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Marcus Gutierrez, Christopher Kiekintveld |
Adapting with Honeypot Configurations to Detect Evolving Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, AAMAS 2017, São Paulo, Brazil, May 8-12, 2017, pp. 1565-1567, 2017, ACM. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
19 | William W. Hager, Hongchao Zhang |
Projection onto a Polyhedron that Exploits Sparsity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIAM J. Optim. ![In: SIAM J. Optim. 26(3), pp. 1773-1798, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Artem Napov, Xiaoye S. Li |
An algebraic multifrontal preconditioner that exploits the low-rank property. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Numer. Linear Algebra Appl. ![In: Numer. Linear Algebra Appl. 23(1), pp. 61-82, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Mauro Conti, Stephen Crane, Tommaso Frassetto, Andrei Homescu, Georg Koppen, Per Larsen, Christopher Liebchen, Mike Perry, Ahmad-Reza Sadeghi |
Selfrando: Securing the Tor Browser against De-anonymization Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. Priv. Enhancing Technol. ![In: Proc. Priv. Enhancing Technol. 2016(4), pp. 454-469, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Eunyoung Kim, Jongsub Moon |
A new approach to deploying private mobile network exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 72(1), pp. 46-57, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Roger Piqueras Jover |
LTE security, protocol exploits and location tracking experimentation with low-cost software radio. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1607.05171, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
19 | Tobias Reitmaier, Adrian Calma, Bernhard Sick |
Semi-Supervised Active Learning for Support Vector Machines: A Novel Approach that Exploits Structure Information in Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1610.03995, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
19 | Marty J. Wolf, Nir Fresco |
Ethics of the software vulnerabilities and exploits market. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Soc. ![In: Inf. Soc. 32(4), pp. 269-279, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Peng Zhou 0002, Xiaojing Gu, Rocky K. C. Chang |
Harvesting File Download Exploits in the Web: A Hacker's View. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. J. ![In: Comput. J. 59(4), pp. 522-540, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Alexander Bolshev, Jason Larsen, Marina Krotofil, Reid Wightman |
A Rising Tide: Design Exploits in Industrial Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOOT ![In: 10th USENIX Workshop on Offensive Technologies, WOOT 16, Austin, TX, USA, August 8-9, 2016., 2016, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
19 | Sergey Bratus, Travis Goodspeed, Ange Albertini, Debanjum S. Solanky |
Fillory of PHY: Toward a Periodic Table of Signal Corruption Exploits and Polyglots in Digital Radio. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOOT ![In: 10th USENIX Workshop on Offensive Technologies, WOOT 16, Austin, TX, USA, August 8-9, 2016., 2016, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
19 | Yue Cao 0003, Zhiyun Qian, Zhongjie Wang 0002, Tuan Dao, Srikanth V. Krishnamurthy, Lisa M. Marvel |
Off-Path TCP Exploits: Global Rate Limit Considered Dangerous. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016., pp. 209-225, 2016, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
19 | Wei Xie, Yong Chen 0001, Philip C. Roth |
Parallel-DFTL: A Flash Translation Layer That Exploits Internal Parallelism in Solid State Drives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NAS ![In: IEEE International Conference on Networking, Architecture and Storage (NAS), Long Beach, CA, USA, August 8-10, 2016, pp. 1-10, 2016, IEEE Computer Society, 978-1-5090-3315-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Olgierd Pieczul, Simon N. Foley |
Runtime Detection of Zero-Day Vulnerability Exploits in Contemporary Software Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security and Privacy XXX - 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings, pp. 347-363, 2016, Springer, 978-3-319-41482-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Xunchao Hu, Aravind Prakash, Jinghan Wang, Rundong Zhou, Yao Cheng, Heng Yin 0001 |
Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings, pp. 254-276, 2016, Springer, 978-3-319-45718-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Takeshi Kano, Kotaro Yasui, Dai Owaki, Akio Ishiguro |
Decentralized Control Scheme for Myriapod Locomotion That Exploits Local Force Feedback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Living Machines ![In: Biomimetic and Biohybrid Systems - 5th International Conference, Living Machines 2016, Edinburgh, UK, July 19-22, 2016. Proceedings, pp. 449-453, 2016, Springer, 978-3-319-42416-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Mingyu Guo, Hideaki Hata, Muhammad Ali Babar 0001 |
Revenue Maximizing Markets for Zero-Day Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRIMA ![In: PRIMA 2016: Princiles and Practice of Multi-Agent Systems - 19th International Conference, Phuket, Thailand, August 22-26, 2016, Proceedings, pp. 247-260, 2016, Springer, 978-3-319-44831-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Tingting Li 0001, Chris Hankin |
Effective Defence Against Zero-Day Exploits Using Bayesian Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRITIS ![In: Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Paris, France, October 10-12, 2016, Revised Selected Papers, pp. 123-136, 2016, Springer, 978-3-319-71367-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Tomohiro Ishikawa, Hiroshi Hasegawa, Suresh Subramaniam 0001, Ken-ichi Sato |
A compact OXC node architecture that exploits dynamic path bundling and routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ONDM ![In: 2016 International Conference on Optical Network Design and Modeling, ONDM 2016, Cartagena, Spain, May 9-12, 2016, pp. 1-6, 2016, IEEE, 978-1-4673-9988-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Sampsa Rauti, Samuel Laurén, Joni Uitto, Shohreh Hosseinzadeh, Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen |
A Survey on Internal Interfaces Used by Exploits and Implications on Interface Diversification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordSec ![In: Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016, Proceedings, pp. 152-168, 2016, 978-3-319-47559-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Hannes Holm, Teodor Sommestad |
SVED: Scanning, Vulnerabilities, Exploits and Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MILCOM ![In: 2016 IEEE Military Communications Conference, MILCOM 2016, Baltimore, MD, USA, November 1-3, 2016, pp. 976-981, 2016, IEEE, 978-1-5090-3781-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen |
Trading exploits online: A preliminary case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RCIS ![In: Tenth IEEE International Conference on Research Challenges in Information Science, RCIS 2016, Grenoble, France, June 1-3, 2016, pp. 1-12, 2016, IEEE, 978-1-4799-8710-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Gildo Torres, Chen Liu 0001 |
Can Data-Only Exploits be Detected at Runtime Using Hardware Events?: A Case Study of the Heartbleed Vulnerability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASP@ISCA ![In: Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016, pp. 2:1-2:7, 2016, ACM, 978-1-4503-4769-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Murat Gul, Muhammed Ali Aydin |
Exploits in information security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIU ![In: 24th Signal Processing and Communication Application Conference, SIU 2016, Zonguldak, Turkey, May 16-19, 2016, pp. 1729-1732, 2016, IEEE, 978-1-5090-1679-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Chengyu Song |
Preventing exploits against memory corruption vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2016 |
RDF |
|
19 | Ch. Sanjeev Kumar Das |
Hardware-assisted online defense against malware and exploits ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2016 |
DOI RDF |
|
Displaying result #101 - #200 of 5956 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|