Search

Your search keyword '"buffer overflow"' showing total 2,226 results

Search Constraints

Start Over You searched for: Descriptor "buffer overflow" Remove constraint Descriptor: "buffer overflow"
2,226 results on '"buffer overflow"'

Search Results

153. Learning Unknown Attacks — A Start

156. 一种抗地址淹没的缓冲区栈溢出算法.

157. An Efficient Approach for Storage Balancing in Wireless Sensor Networks.

158. Stepwise Adjustment of Constrained Application Protocol Observing Period for Internet of Things Applications Using Wireless Sensor Networks.

159. Superframe Duration Allocation Schemes to Improve the Throughput of Cluster-Tree Wireless Sensor Networks.

161. Stacy-static code analysis for enhanced vulnerability detection

162. A Flow Control Scheme Based on Per Hop and Per Flow in Commodity Switches for Lossless Networks

163. Frame Control-Based Terrestrial UHD (ATSC 3.0) Buffer Model for Dynamic Content Insertion

165. Hardware Assisted Buffer Protection Mechanisms for Embedded RISC-V

166. On Detecting Code Reuse Attacks

167. Adaptive Channel Selection and Transmission Timing Control for Simultaneous Receiving and Sending in Relay-Based UAV Network

168. A frame-level MLP-based bit-rate controller for real-time video transmission using VVC standard

169. Cooperative Network Model for Joint Mobile Sink Scheduling and Dynamic Buffer Management Using Q-Learning

170. Analysis of an M/PH/1 Retrial Queueing-Inventory System with Level Dependent Retrial Rate

171. Mitigating congestion in wireless sensor networks through clustering and queue assistance: a survey

172. An instrumentation based algorithm for stack overflow detection

173. Point of Congestion in Large Buffer Mobile Opportunistic Networks

174. Bidirectional Viterbi decoding algorithm for OvTDM

175. EVALUATION OF SIMULATION RESULTS OF DATA TRANSMISSION MODELING ON A CHANNEL WITH RANDOM ACCESS

176. Finding Bugs in File Systems with an Extensible Fuzzing Framework

177. Delay-Sensitive Energy-Harvesting Wireless Sensors: Optimal Scheduling, Structural Properties, and Approximation Analysis

178. IMPULP: A Hardware Approach for In-Process Memory Protection via User-Level Partitioning

179. An Efficient Buffer Overflow Control Scheme to Mitigate Packet Loss in Manets

180. FJND-based fuzzy rate control of scalable video for streaming applications

181. Vulnerabilities of Software for Mobile Phones and Secure Programming Techniques

185. Rate Control in MPEG

189. ROP gadget analyzer for the RISC-V architecture

191. A Fine-Grained Control Flow Integrity Approach Against Runtime Memory Attacks for Embedded Systems.

192. ROPocop — Dynamic mitigation of code-reuse attacks.

193. On the Throughput of Multi-Source Multi-Destination Relay Networks With Queueing Constraints.

194. Survey of return-oriented programming defense mechanisms.

195. Counter-Measures against Stack Buffer Overflows in GNU/Linux Operating Systems.

196. Traffic-aware Cooperative Binary Exponential Backoff Algorithm for Low Power and Lossy Networks.

199. A Fuzzing Method for Embedded Software

200. Non-invasive I2C Hardware Trojan Attack Vector

Catalog

Books, media, physical & digital resources