Font Size: a A A
Keyword [buffer overflow]
Result: 121 - 139 | Page: 7 of 7
121. A Detection Approach For Buffer Overflow Vulnerability Based On Data Control Flow Graph
122. Research On Randomization Of Heap Memory Oriented Buffer Overflow Vulnerability
123. Research On Prediction Method Of Software Buffer Overflow Vulnerability Based On Software Metrics
124. Research On Attack And Defense Technology Based On Buffer Overflow
125. Address Randomization For Dynamic Memory Allocators On The GPU
126. A Fast And Secure GPU Memory Allocator
127. Research On Malware Detection Method For Buffer Overflow Vulnerability In Network Traffic
128. Advanced software testing techniques based on combinatorial design
129. Secure Bit: Buffer-overflow protection
130. The Effectiveness of a Random Forests Model in Detecting Network-Based Buffer Overflow Attacks
131. Simulating hardware-level buffer-overflow protection
132. Sky-walker: An integrated solution for network and computer security
133. A metric for identifying system exploitation developed through a study in buffer overflow exploits
134. Measurement-based quality of service provisioning in multimedia telecommunication networks
135. Service quality guidelines for public broadband networks
136. Network traffic modeling and analysis
137. Research On Software Buffer Overflow Vulnerability Detection Method Based On Deep Learning
138. Research On Buffer Overflow Vulnerability Detection Technology Of Binary Programs Based On Code Characteristics
139. Research On Buffer Overflow Vulnerability Detection Based On Fuzzing
  <<First  <Prev  Next>  Last>>  Jump to