The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for exploits with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1960-1984 (17) 1985-1987 (16) 1988-1989 (24) 1990 (28) 1991 (20) 1992-1993 (41) 1994 (40) 1995 (58) 1996 (63) 1997 (98) 1998 (78) 1999 (155) 2000 (164) 2001 (201) 2002 (287) 2003 (302) 2004 (477) 2005 (636) 2006 (762) 2007 (788) 2008 (828) 2009 (498) 2010 (102) 2011 (28) 2012 (20) 2013 (17) 2014 (16) 2015 (15) 2016 (25) 2017 (24) 2018 (25) 2019 (18) 2020-2021 (38) 2022 (28) 2023 (17) 2024 (2)
Publication types (Num. hits)
article(1216) book(1) incollection(20) inproceedings(4702) phdthesis(11) proceedings(6)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 6048 occurrences of 3544 keywords

Results
Found 5956 publication records. Showing 5956 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
19Amir Elmishali, Roni Stern, Meir Kalech Diagnosing Software System Exploits. Search on Bibsonomy IEEE Intell. Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Roger Piqueras Jover Security Analysis of SMS as a Second Factor of Authentication: The challenges of multifactor authentication based on SMS, including cellular security deficiencies, SS7 exploits, and SIM swapping. Search on Bibsonomy ACM Queue The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19José Luis Valtierra, Manuel Delgado-Restituto, Rafaella Fiorelli, Ángel Rodríguez-Vázquez A Sub- $\mu$ W Reconfigurable Front-End for Invasive Neural Recording That Exploits the Spectral Characteristics of the Wideband Neural Signal. Search on Bibsonomy IEEE Trans. Circuits Syst. I Fundam. Theory Appl. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Xuewei Feng, Chuanpu Fu, Qi Li 0002, Kun Sun 0001, Ke Xu 0002 Off-Path TCP Exploits of the Mixed IPID Assignment. Search on Bibsonomy CCS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Ruixu Liu, Ju Shen, He Wang, Chen Chen 0001, Sen-Ching S. Cheung, Vijayan K. Asari Attention Mechanism Exploits Temporal Contexts: Real-Time 3D Human Pose Reconstruction. Search on Bibsonomy CVPR The full citation details ... 2020 DBLP  BibTeX  RDF
19Benjamin Ampel, Sagar Samtani, Hongyi Zhu, Steven Ullman, Hsinchun Chen Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach. Search on Bibsonomy ISI The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Tsvetoslava Vateva-Gurova Analysis and Detection of Cache-Based Exploits. Search on Bibsonomy 2020   RDF
19Sebastian-Amadeo Schmolck Rechtliche Vorgaben für die Weitergabe und Nutzung von Softwareschwachstellen und Exploits. Search on Bibsonomy 2020   RDF
19Toni Karvonen, Simo Särkkä, Chris J. Oates Symmetry exploits for Bayesian cubature methods. Search on Bibsonomy Stat. Comput. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Andrey Fedorchenko, Elena Doynikova, Igor V. Kotenko Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits. Search on Bibsonomy J. Univers. Comput. Sci. The full citation details ... 2019 DBLP  BibTeX  RDF
19Nicholas J. Higham, Théo Mary A New Preconditioner that Exploits Low-Rank Approximations to Factorization Error. Search on Bibsonomy SIAM J. Sci. Comput. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Thibaut Stimpfling, Normand Bélanger, J. M. Pierre Langlois, Yvon Savaria SHIP: A Scalable High-Performance IPv6 Lookup Algorithm That Exploits Prefix Characteristics. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Stanislav Dashevskyi, Daniel Ricardo dos Santos, Fabio Massacci, Antonino Sabetta TestREx: a framework for repeatable exploits. Search on Bibsonomy Int. J. Softw. Tools Technol. Transf. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Le Guan, Chen Cao, Peng Liu 0005, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu 0001, Trent Jaeger Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Xin Zhou, Jianmin Pang Expdf: Exploits Detection System Based on Machine-Learning. Search on Bibsonomy Int. J. Comput. Intell. Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Ioannis Stellios, Panayiotis Kotzanikolaou, Mihalis Psarakis Advanced Persistent Threats and Zero-Day Exploits in Industrial Internet of Things. Search on Bibsonomy Security and Privacy Trends in the Industrial Internet of Thing The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Da-Yu Kao, Shou-Ching Hsiao, Raylin Tso Analyzing WannaCry Ransomware Considering the Weapons and Exploits. Search on Bibsonomy ICACT The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty Revisiting the Security of LPN Based RFID Authentication Protocol and Potential Exploits in Hardware Implementations. Search on Bibsonomy SPACE The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Mingsong Zhou, Fanping Zeng, Yu Zhang 0086, Chengcheng Lv, Zhao Chen, Guozhu Chen Automatic Generation of Capability Leaks' Exploits for Android Applications. Search on Bibsonomy ICST Workshops The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Matt Goerzen, Elizabeth Anne Watkins, Gabrielle Lim Entanglements and Exploits: Sociotechnical Security as an Analytic Framework. Search on Bibsonomy FOCI @ USENIX Security Symposium The full citation details ... 2019 DBLP  BibTeX  RDF
19Shih-Wei Li, John S. Koh, Jason Nieh Protecting Cloud Virtual Machines from Hypervisor and Host Operating System Exploits. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2019 DBLP  BibTeX  RDF
19Michael Schwarz 0001, Florian Lackner, Daniel Gruss JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
19Xunchao Hu, Brian Testa, Heng Yin 0001 ChaffyScript: Vulnerability-Agnostic Defense of JavaScript Exploits via Memory Perturbation. Search on Bibsonomy SecureComm (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Eina Hashimoto, Masatsugu Ichino, Hiroshi Yoshiura A Re-Identification Strategy Using Machine Learning that Exploits Better Side Data. Search on Bibsonomy iCAST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Yue Li Finding concurrency exploits on smart contracts. Search on Bibsonomy ICSE (Companion Volume) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19David Gens OS-level Attacks and Defenses: from Software to Hardware-based Exploits. Search on Bibsonomy 2019   RDF
19Guillermo Suarez-Tangil, Santanu Kumar Dash 0001, Pedro García-Teodoro, José Camacho 0001, Lorenzo Cavallaro Anomaly-based exploratory analysis and detection of exploits in android mediaserver. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Chin-Chia Michael Yeh, Yan Zhu 0014, Liudmila Ulanova, Nurjahan Begum, Yifei Ding, Hoang Anh Dau, Zachary Zimmerman, Diego Furtado Silva, Abdullah Mueen 0001, Eamonn J. Keogh Time series joins, motifs, discords and shapelets: a unifying view that exploits the matrix profile. Search on Bibsonomy Data Min. Knowl. Discov. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Adrian Calma, Tobias Reitmaier, Bernhard Sick Semi-supervised active learning for support vector machines: A novel approach that exploits structure information in data. Search on Bibsonomy Inf. Sci. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Eman M. Hammad, Ahmed Mostafa Khalil, Abdallah K. Farraj, Deepa Kundur, Reza Iravani A Class of Switching Exploits Based on Inter-Area Oscillations. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Yue Cao 0003, Zhiyun Qian, Zhongjie Wang 0002, Tuan Dao, Srikanth V. Krishnamurthy, Lisa M. Marvel Off-Path TCP Exploits of the Challenge ACK Global Rate Limit. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Alex Grieve, Michael Davies, Phillip H. Jones, Joseph Zambreno ARMOR: A Recompilation and Instrumentation-Free Monitoring Architecture for Detecting Memory Exploits. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19N. Sasikaladevi, K. Geetha, K. N. Venkata Srinivas A multi-tier security system (SAIL) for protecting audio signals from malicious exploits. Search on Bibsonomy Int. J. Speech Technol. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Amara Dinesh Kumar, Koti Naga Renu Chebrolu, R. Vinayakumar, Soman K. P A Brief Survey on Autonomous Vehicle Possible Attacks, Exploits and Vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
19Pranava Swaroop Madhyastha, Josiah Wang, Lucia Specia End-to-end Image Captioning Exploits Multimodal Distributional Similarity. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
19Huasong Meng, Vrizlynn L. L. Thing, Yao Cheng, Zhongmin Dai, Li Zhang A survey of Android exploits in the wild. Search on Bibsonomy Comput. Secur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Tobias May Robust Speech Dereverberation With a Neural Network-Based Post-Filter That Exploits Multi-Conditional Training of Binaural Cues. Search on Bibsonomy IEEE ACM Trans. Audio Speech Lang. Process. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Daiping Liu, Mingwei Zhang 0005, Haining Wang A Robust and Efficient Defense against Use-after-Free Exploits via Concurrent Pointer Sweeping. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Tiantian Tan, Baosheng Wang, Zhou Xu, Yong Tang The New Progress in the Research of Binary Vulnerability Exploits. Search on Bibsonomy ICCCS (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Pal-Stefan Murvay, Bogdan Groza Practical Security Exploits of the FlexRay In-Vehicle Communication Protocol. Search on Bibsonomy CRiSIS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Miah A. Halim, Robert Rantz, Qian Zhang, Lei Gu, Ken Yang, Shad Roundy Modeling and Experimental Analysis of a Wearable Energy Harvester that Exploits Human-Body Motion. Search on Bibsonomy IEEE SENSORS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Caroline Trippel, Daniel Lustig, Margaret Martonosi CheckMate: Automated Synthesis of Hardware Exploits and Security Litmus Tests. Search on Bibsonomy MICRO The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Siddhartha Verma, Thomas Gruber 0004, Peter P. Puschner, Christoph Schmittner, Erwin Schoitsch A Quantitative Approach for the Likelihood of Exploits of System Vulnerabilities. Search on Bibsonomy SAFECOMP Workshops The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Marco Angelini, Graziano Blasilli, Pietro Borrello, Emilio Coppa, Daniele Cono D'Elia, Serena Ferracci, Simone Lenti, Giuseppe Santucci ROPMate: Visually Assisting the Creation of ROP-based Exploits. Search on Bibsonomy VizSEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Guangliang Yang 0001, Jeff Huang 0001, Guofei Gu Automated Generation of Event-Oriented Exploits in Android Hybrid Apps. Search on Bibsonomy NDSS The full citation details ... 2018 DBLP  BibTeX  RDF
19Roman Rädle, Hans-Christian Jetter, Jonathan Fischer, Inti Gabriel, Clemens Nylandsted Klokmose, Harald Reiterer, Christian Holz 0001 PolarTrack: Optical Outside-In Device Tracking that Exploits Display Polarization. Search on Bibsonomy CHI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Pranava Swaroop Madhyastha, Josiah Wang, Lucia Specia End-to-end Image Captioning Exploits Distributional Similarity in Multimodal Space. Search on Bibsonomy BlackboxNLP@EMNLP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Alexander Reinthal, Eleftherios Lef Filippakis, Magnus Almgren Data Modelling for Predicting Exploits. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Shachee Mishra, Michalis Polychronakis Shredder: Breaking Exploits through API Specialization. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Pranava Swaroop Madhyastha, Josiah Wang, Lucia Specia End-to-end Image Captioning Exploits Distributional Similarity in Multimodal Space. Search on Bibsonomy BMVC The full citation details ... 2018 DBLP  BibTeX  RDF
19El Habib Boudjema Defense against software exploits. (Défense contre les attaques de logiciels). Search on Bibsonomy 2018   RDF
19Yasue Kishino, Yutaka Yanagisawa, Yoshinari Shirai, Shin Mizutani, Takayuki Suyama, Futoshi Naya Agile Environmental Monitoring Exploits Rapid Prototyping and In Situ Adaptation. Search on Bibsonomy IEEE Pervasive Comput. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Nayeem Islam, Saumitra Das, Yin Chen On-Device Mobile Phone Security Exploits Machine Learning. Search on Bibsonomy IEEE Pervasive Comput. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Jukka Ruohonen Classifying Web Exploits with Topic Modeling. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
19Stanislav Dashevskyi, Daniel Ricardo dos Santos, Fabio Massacci, Antonino Sabetta TestREx: a Framework for Repeatable Exploits. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
19Thibaut Stimpfling, Normand Bélanger, J. M. Pierre Langlois, Yvon Savaria SHIP: A Scalable High-performance IPv6 Lookup Algorithm that Exploits Prefix Characteristics. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
19Hocheol Shin, Dohyun Kim 0004, Yujin Kwon, Yongdae Kim Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
19Run Wang, Pei Liu, Lei Zhao, Yueqiang Cheng, Lina Wang 0001 deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level. Search on Bibsonomy J. Syst. Softw. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Dusan Repel, Johannes Kinder, Lorenzo Cavallaro Modular Synthesis of Heap Exploits. Search on Bibsonomy PLAS@CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Subhojeet Mukherjee, Noah Cain, Jacob Walker, David White, Indrajit Ray, Indrakshi Ray POSTER: PenJ1939: An Interactive Framework for Design and Dissemination of Exploits for Commercial Vehicles. Search on Bibsonomy CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Wei You, Peiyuan Zong, Kai Chen 0012, XiaoFeng Wang 0001, Xiaojing Liao, Pan Bian, Bin Liang 0002 SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits. Search on Bibsonomy CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Victor C. Valgenti, Ya-Wen Lin, Atsuhiro Suzuki, Min Sik Kim Simulating Exploits for the Creation and Refinement of Detection Signatures. Search on Bibsonomy MASCOTS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Yu Cai 0001, Saugata Ghose, Yixin Luo, Ken Mai, Onur Mutlu, Erich F. Haratsch Vulnerabilities in MLC NAND Flash Memory Programming: Experimental Analysis, Exploits, and Mitigation Techniques. Search on Bibsonomy HPCA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Gustavo K. Contreras, Adib Nahiyan, Swarup Bhunia, Domenic Forte, Mark M. Tehranipoor Security vulnerability analysis of design-for-test exploits for asset protection in SoCs. Search on Bibsonomy ASP-DAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Mohammed Almukaynizi, Eric Nunes, Krishna Dharaiya, Manoj Senguttuvan, Jana Shakarian, Paulo Shakarian Proactive identification of exploits in the wild through vulnerability mentions online. Search on Bibsonomy CyCon U.S. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Ioannis Gasparis, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy Detecting Android Root Exploits by Learning from Root Providers. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2017 DBLP  BibTeX  RDF
19Christina Leuker, Timothy J. Pleskac, Thorsten Pachur, Ralph Hertwig How the Mind Exploits Risk-Reward Structures in Decisions under Risk. Search on Bibsonomy CogSci The full citation details ... 2017 DBLP  BibTeX  RDF
19Joshua Garcia, Mahmoud Hammad, Negar Ghorbani, Sam Malek Automatic generation of inter-component communication exploits for Android applications. Search on Bibsonomy ESEC/SIGSOFT FSE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Christian Giovanelli, Xin Liu 0020, Seppo A. Sierla, Valeriy Vyatkin, Ryutaro Ichise Towards an aggregator that exploits big data to bid on frequency containment reserve market. Search on Bibsonomy IECON The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Marcus Paul Gutierrez, Christopher Kiekintveld Adapting Honeypot Configurations to Detect Evolving Exploits. Search on Bibsonomy AAAI Workshops The full citation details ... 2017 DBLP  BibTeX  RDF
19Jukka Ruohonen Classifying Web Exploits with Topic Modeling. Search on Bibsonomy DEXA Workshops The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Mingyu Guo, Hideaki Hata, Muhammad Ali Babar 0001 Optimizing Affine Maximizer Auctions via Linear Programming: An Application to Revenue Maximizing Mechanism Design for Zero-Day Exploits Markets. Search on Bibsonomy PRIMA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Tiffany Bao, Ruoyu Wang 0001, Yan Shoshitaishvili, David Brumley Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Hocheol Shin, Dohyun Kim 0004, Yujin Kwon, Yongdae Kim Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Marcus Gutierrez, Christopher Kiekintveld Adapting with Honeypot Configurations to Detect Evolving Exploits. Search on Bibsonomy AAMAS The full citation details ... 2017 DBLP  BibTeX  RDF
19William W. Hager, Hongchao Zhang Projection onto a Polyhedron that Exploits Sparsity. Search on Bibsonomy SIAM J. Optim. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Artem Napov, Xiaoye S. Li An algebraic multifrontal preconditioner that exploits the low-rank property. Search on Bibsonomy Numer. Linear Algebra Appl. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Mauro Conti, Stephen Crane, Tommaso Frassetto, Andrei Homescu, Georg Koppen, Per Larsen, Christopher Liebchen, Mike Perry, Ahmad-Reza Sadeghi Selfrando: Securing the Tor Browser against De-anonymization Exploits. Search on Bibsonomy Proc. Priv. Enhancing Technol. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Eunyoung Kim, Jongsub Moon A new approach to deploying private mobile network exploits. Search on Bibsonomy J. Supercomput. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Roger Piqueras Jover LTE security, protocol exploits and location tracking experimentation with low-cost software radio. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
19Tobias Reitmaier, Adrian Calma, Bernhard Sick Semi-Supervised Active Learning for Support Vector Machines: A Novel Approach that Exploits Structure Information in Data. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
19Marty J. Wolf, Nir Fresco Ethics of the software vulnerabilities and exploits market. Search on Bibsonomy Inf. Soc. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Peng Zhou 0002, Xiaojing Gu, Rocky K. C. Chang Harvesting File Download Exploits in the Web: A Hacker's View. Search on Bibsonomy Comput. J. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Alexander Bolshev, Jason Larsen, Marina Krotofil, Reid Wightman A Rising Tide: Design Exploits in Industrial Control Systems. Search on Bibsonomy WOOT The full citation details ... 2016 DBLP  BibTeX  RDF
19Sergey Bratus, Travis Goodspeed, Ange Albertini, Debanjum S. Solanky Fillory of PHY: Toward a Periodic Table of Signal Corruption Exploits and Polyglots in Digital Radio. Search on Bibsonomy WOOT The full citation details ... 2016 DBLP  BibTeX  RDF
19Yue Cao 0003, Zhiyun Qian, Zhongjie Wang 0002, Tuan Dao, Srikanth V. Krishnamurthy, Lisa M. Marvel Off-Path TCP Exploits: Global Rate Limit Considered Dangerous. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2016 DBLP  BibTeX  RDF
19Wei Xie, Yong Chen 0001, Philip C. Roth Parallel-DFTL: A Flash Translation Layer That Exploits Internal Parallelism in Solid State Drives. Search on Bibsonomy NAS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Olgierd Pieczul, Simon N. Foley Runtime Detection of Zero-Day Vulnerability Exploits in Contemporary Software Systems. Search on Bibsonomy DBSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Xunchao Hu, Aravind Prakash, Jinghan Wang, Rundong Zhou, Yao Cheng, Heng Yin 0001 Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary Analysis. Search on Bibsonomy RAID The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Takeshi Kano, Kotaro Yasui, Dai Owaki, Akio Ishiguro Decentralized Control Scheme for Myriapod Locomotion That Exploits Local Force Feedback. Search on Bibsonomy Living Machines The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Mingyu Guo, Hideaki Hata, Muhammad Ali Babar 0001 Revenue Maximizing Markets for Zero-Day Exploits. Search on Bibsonomy PRIMA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Tingting Li 0001, Chris Hankin Effective Defence Against Zero-Day Exploits Using Bayesian Networks. Search on Bibsonomy CRITIS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Tomohiro Ishikawa, Hiroshi Hasegawa, Suresh Subramaniam 0001, Ken-ichi Sato A compact OXC node architecture that exploits dynamic path bundling and routing. Search on Bibsonomy ONDM The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Sampsa Rauti, Samuel Laurén, Joni Uitto, Shohreh Hosseinzadeh, Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen A Survey on Internal Interfaces Used by Exploits and Implications on Interface Diversification. Search on Bibsonomy NordSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Hannes Holm, Teodor Sommestad SVED: Scanning, Vulnerabilities, Exploits and Detection. Search on Bibsonomy MILCOM The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen Trading exploits online: A preliminary case study. Search on Bibsonomy RCIS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Gildo Torres, Chen Liu 0001 Can Data-Only Exploits be Detected at Runtime Using Hardware Events?: A Case Study of the Heartbleed Vulnerability. Search on Bibsonomy HASP@ISCA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Murat Gul, Muhammed Ali Aydin Exploits in information security. Search on Bibsonomy SIU The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Chengyu Song Preventing exploits against memory corruption vulnerabilities. Search on Bibsonomy 2016   RDF
19Ch. Sanjeev Kumar Das Hardware-assisted online defense against malware and exploits Search on Bibsonomy 2016   DOI  RDF
Displaying result #101 - #200 of 5956 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license