Search

Your search keyword '"Buffer overflow"' showing total 19 results

Search Constraints

Start Over You searched for: Descriptor "Buffer overflow" Remove constraint Descriptor: "Buffer overflow" Publisher springer nature Remove constraint Publisher: springer nature
19 results on '"Buffer overflow"'

Search Results

1. A buffer overflow detection and defense method based on RISC-V instruction set extension.

2. Priority based data gathering using multiple mobile sinks in cluster based UWSNs for oil pipeline leakage detection.

3. Automatic Buffer Overflow Warning Validation.

4. SSPFA: effective stack smashing protection for Android OS.

5. Traffic-aware Cooperative Binary Exponential Backoff Algorithm for Low Power and Lossy Networks.

6. Modeling the search for vulnerabilities via the fuzzing method using an automation representation of network protocols.

7. Power and Buffer Overflow Optimization in Wireless Sensor Nodes.

8. BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks.

9. Arrival Process-Controlled Adaptive Media Playout for Video Streaming.

10. Security Assessment Framework Using Static Analysis and Fault Injection.

11. Data Space Randomization.

12. Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks.

13. Arrival process-controlled adaptive media playout with multiple thresholds for video streaming.

14. Protecting against address space layout randomisation (ASLR) compromises and return-to-libc attacks using network intrusion detection systems.

15. A Simple Superposition Coding Scheme for Optimizing Resource Allocation in Downlink OFDMA Systems.

16. Overflow and losses in a network queue with a self-similar input.

17. Chernoff bounds for mean overflow rates.

18. Telecommunication traffic, queueing models, and subexponential distributions.

19. Optimal trajectory to overflow in a queue fed by a large number of sources.

Catalog

Books, media, physical & digital resources