The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for exploits with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1960-1984 (17) 1985-1987 (16) 1988-1989 (24) 1990 (28) 1991 (20) 1992-1993 (41) 1994 (40) 1995 (58) 1996 (63) 1997 (98) 1998 (78) 1999 (155) 2000 (164) 2001 (201) 2002 (287) 2003 (302) 2004 (477) 2005 (636) 2006 (762) 2007 (788) 2008 (828) 2009 (498) 2010 (102) 2011 (28) 2012 (20) 2013 (17) 2014 (16) 2015 (15) 2016 (25) 2017 (24) 2018 (25) 2019 (18) 2020-2021 (38) 2022 (28) 2023 (17) 2024 (2)
Publication types (Num. hits)
article(1216) book(1) incollection(20) inproceedings(4702) phdthesis(11) proceedings(6)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 6048 occurrences of 3544 keywords

Results
Found 5956 publication records. Showing 5956 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
47Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Thomas W. Reps, Randal E. Bryant Automatic discovery of API-level exploits. Search on Bibsonomy ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF API-level exploit, bounded model checking
45Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker Beyond heuristics: learning to classify vulnerabilities and predict exploits. Search on Bibsonomy KDD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF SVM, supervised learning, vulnerabilities, exploits
39Stéphane Duverger Linux 2.6 kernel exploits. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Justin Ma, John Dunagan, Helen J. Wang, Stefan Savage, Geoffrey M. Voelker Finding diversity in remote code injection exploits. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF binary emulation, malware classification, worms, phylogeny, bots
31Hung-Min Sun, Yue-Hsun Lin, Ming-Fung Wu API Monitoring System for Defeating Worms and Exploits in MS-Windows System. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Worm Protection, API Hooking, System Security
30Adam D. Todd, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Steven K. Rogers Alert Verification Evasion Through Server Response Forging. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Alert Verification, Network Intrusion Detection, Exploits, Evasion
30Iván Arce The Shellcode Generation. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF taxonomy of attacks, exploitation program, attack, exploits
30Stuart E. Schechter, Michael D. Smith 0001 How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks. Search on Bibsonomy Financial Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Theft, Exploits, Threat Models, Security Economics
27Madhusudhanan Chandrasekaran, Mukarram Baig, Shambhu J. Upadhyaya AEGIS: A Proactive Methodology to Shield against Zero-Day Exploits. Search on Bibsonomy AINA Workshops (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27John G. Levine, Julian B. Grizzard, Henry L. Owen A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Helen J. Wang, Chuanxiong Guo, Daniel R. Simon, Alf Zugenmaier Shield: vulnerability-driven network filters for preventing known vulnerability exploits. Search on Bibsonomy SIGCOMM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF generic protocol analyzer, network filter, vulnerability signature, worm defense, patching
26Marco Cova, Christopher Krügel, Giovanni Vigna Detection and analysis of drive-by-download attacks and malicious JavaScript code. Search on Bibsonomy WWW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF drive-by-download attacks, web client exploits, anomaly detection
26Amontip Jumratjaroenvanit, Yunyong Teng-Amnuay Probability of Attack Based on System Vulnerability Life Cycle. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Zero-day attack, Exploit code, Risk window, Radar chart, Vulnerability, Exploits, Life cycle, Exposure, POA
26Jose Nazario Where the worms aren't. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF securty, worms, vulnerabilities, botnets, exploits
26Prabhaker Mateti A laboratory-based course on internet security. Search on Bibsonomy SIGCSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF TCP/IP exploits, network security, ethics, firewalls, buffer overflow, internet security
24Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer Analyzing network traffic to detect self-decrypting exploit code. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF exploit code, static analysis, emulation, detection, polymorphic, decryption
24Paul Ammann, Duminda Wijesekera, Saket Kaushik Scalable, graph-based network vulnerability analysis. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF monotonic analysis, model checking, scalability, network security, vulnerability, exploit
23Mohammad M. Masud 0001, Latifur Khan, Bhavani Thuraisingham, Xinran Wang, Peng Liu 0005, Sencun Zhu Detecting Remote Exploits Using Data Mining. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Server attacks, exploit code, data mining, attack detection
23Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi Diversified Process Replicæ for Defeating Memory Error Exploits. Search on Bibsonomy IPCCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Madhusudhanan Chandrasekaran, Mukarram Baig, Shambhu J. Upadhyaya AVARE: aggregated vulnerability assessment and response against zero-day exploits. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Jedidiah R. Crandall, Zhendong Su 0001, Shyhtsun Felix Wu, Frederic T. Chong On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF metamorphism, polymorphism, symbolic execution, worms, honeypots, polymorphic worms
23Alf Zugenmaier Countering Automated Exploits with System Security CAPTCHAS. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Giovanni Vigna, William K. Robertson, Davide Balzarotti Testing network-based intrusion detection signatures using mutant exploits. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF intrusion detection, security testing, quality metrics
19Islam Obaidat, Meera Sridhar, Fatemeh Tavakoli DAEDALUS: Defense Against Firmware ROP Exploits Using Stochastic Software Diversity. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Seth Copen Goldstein, Sixiang Gao, Zhenbo Sun BlockGraph: a scalable secure distributed ledger that exploits locality. Search on Bibsonomy Distributed Parallel Databases The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Christoforos Prasatzakis, Theodore Patkos, Dimitris Plexousakis An Intuitive Architecture for a Chatbot that Exploits High-Level Reasoning for Human?Robot Interaction. Search on Bibsonomy ERCIM News The full citation details ... 2023 DBLP  BibTeX  RDF
19Cainã Figueiredo, João Gabriel Lopes de Oliveira, Rodrigo Azevedo Santos, Daniel Vieira, Lucas Miranda, Gerson Zaverucha, Leandro Pfleger de Aguiar, Daniel Sadoc Menasché A Statistical Relational Learning Approach Towards Products, Software Vulnerabilities and Exploits. Search on Bibsonomy IEEE Trans. Netw. Serv. Manag. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Zihao Liu, Arash Moradinegade Dizqah, Jose M. Herreros, Joschka Schaub, Olivier C. L. Haas A Hierarchical Economic Model Predictive Controller That Exploits Look-Ahead Information of Roads to Boost Engine Performance. Search on Bibsonomy IEEE Trans. Control. Syst. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Hadi Eskandari, Michael Bewong, Sabih ur Rehman OutCenTR: A novel semi-supervised framework for predicting exploits of vulnerabilities in high-dimensional datasets. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Andrei Costin, Syed Khandker, Hannu Turtiainen, Timo Hämäläinen 0002 Cybersecurity of COSPAS-SARSAT and EPIRB: threat and attacker models, exploits, future research. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Imen Sayar, Alexandre Bartel, Eric Bodden, Yves Le Traon An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities. Search on Bibsonomy ACM Trans. Softw. Eng. Methodol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Guangquan Xu, Wenqing Lei, Lixiao Gong, Jian Liu 0004, Hongpeng Bai, Kai Chen 0012, Ran Wang, Wei Wang 0012, Kaitai Liang, Weizhe Wang, Weizhi Meng 0001, Shaoying Liu UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management. Search on Bibsonomy Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Zhongyu Pei, Xingman Chen, Songtao Yang, Haixin Duan, Chao Zhang 0008 TAICHI: Transform Your Secret Exploits Into Mine From a Victim's Perspective. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Prabith GS, S. Abhishek, Anjali T, Radhika Ravindran Zero-Click Exploits and Malware: An In-Depth Analysis and Case Studies. Search on Bibsonomy SIN The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19K. Mohamed Sharaafat, Yi Ling Celeste Lau, Sebastian Wong, Yu Tan, Muhammad Khairin Bin Mohd, Isaac Medina Agatep, Zhiyuan Zhang 0004, Huaqun Guo Data Crawling for Malware Analysis for Holistic Prevention of Future Exploits. Search on Bibsonomy ICCCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Artur Balsam, Maciej Roman Nowak, Michal Walkowski, Jacek Oko, Slawomir Sujecki Analysis of CVSS Vulnerability Base Scores in the Context of Exploits' Availability. Search on Bibsonomy ICTON The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Xiaoming Ruan, Yaoxiang Yu, Wenhao Ma, Bo Cai Prompt Learning for Developing Software Exploits. Search on Bibsonomy Internetware The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Andrei Costin, Hannu Turtiainen, Syed Khandkher, Timo Hämäläinen 0002 Cybersecurity of COSPAS-SARSAT and EPIRB: threat and attacker models, exploits, future research. Search on Bibsonomy SpaceSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Richard Ward, Andrew Johnson 0008 Identifying Microbenchmark Signatures of Existing Microarchitectural Exploits Using the Unified Side Channel Attack - Model (USCA-M) Four-Phase Testing Process. Search on Bibsonomy ISDFS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Shi-Ming Lu, Hsuan-Jung Su, Ming-Ting Chen An Adaptive Duplex Switching Scheme That Exploits Interference Statistics for Hybrid-Duplex Cellular Networks. Search on Bibsonomy WPMC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Eric Pauley, Paul Barford, Patrick D. McDaniel The CVE Wayback Machine: Measuring Coordinated Disclosure from Exploits against Two Years of Zero-Days. Search on Bibsonomy IMC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Talal Halabi, Mohammad Zulkernine The Ultimate Battle Against Zero-Day Exploits: Toward Fully Autonomous Cyber-Physical Defense. Search on Bibsonomy SSE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Carlo Baldassi Recombinator-k-Means: An Evolutionary Algorithm That Exploits k-Means++ for Recombination. Search on Bibsonomy IEEE Trans. Evol. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Marko Rogge 0-Day-Exploits - Bange machen gilt nicht. Search on Bibsonomy Wirtschaftsinformatik Manag. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Yasmany Prieto, Miguel E. Figueroa, Jorge E. Pezoa Guaranteeing Network Reliability to 0-Day Exploits Using Cost-Effective Heterogeneous Node Migration. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Shaochen Wang, Zhangli Zhou, Zhen Kan When Transformer Meets Robotic Grasping: Exploits Context for Efficient Grasp Detection. Search on Bibsonomy IEEE Robotics Autom. Lett. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Tin Lai, Fabio Ramos 0001 Adaptively Exploits Local Structure With Generalised Multi-Trees Motion Planning. Search on Bibsonomy IEEE Robotics Autom. Lett. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Sagar Samtani, Yidong Chai, Hsinchun Chen Linking Exploits from the Dark Web to Known Vulnerabilities for Proactive Cyber Threat Intelligence: An Attention-Based Deep Structured Semantic Model. Search on Bibsonomy MIS Q. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Shaochen Wang, Zhangli Zhou, Zhen Kan When Transformer Meets Robotic Grasping: Exploits Context for Efficient Grasp Detection. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
19Chen Yan 0001, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji 0001, Wenyuan Xu 0001 Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Yang Su, Damith C. Ranasinghe Leaving Your Things Unattended is No Joke! Memory Bus Snooping and Open Debug Interface Exploits. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
19Jie Fu On Almost-Sure Intention Deception Planning that Exploits Imperfect Observers. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Imen Sayar, Alexandre Bartel, Eric Bodden, Yves Le Traon An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Soufian El Yadmani, Robin The, Olga Gadyatskaya How security professionals are being attacked: A study of malicious CVE proof of concept exploits in GitHub. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Jonah Burgess Malware and Exploits on the Dark Web. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Huan He, Shifan Zhao, Ziyuan Tang, Joyce C. Ho, Yousef Saad, Yuanzhe Xi An Efficient Nonlinear Acceleration method that Exploits Symmetry of the Hessian. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Marek Janiszewski, Marcin Rytel, Piotr Lewandowski, Hubert Romanowski Creating vulnerabilities and exploits database of IoT devices. Search on Bibsonomy EICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Leona McNulty, Vassilios G. Vassilakis IoT Botnets: Characteristics, Exploits, Attack Capabilities, and Targets. Search on Bibsonomy CSNDSP The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Serge Demeyer, Henrique Rocha, Darin Verheijke Refactoring Solidity Smart Contracts to Protect Against Reentrancy Exploits. Search on Bibsonomy ISoLA (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Jie Fu On Almost-Sure Intention Deception Planning that Exploits Imperfect Observers. Search on Bibsonomy GameSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Swati Kiran Rajput, R. Umamageswari, Rajesh Singh 0001, Lalit Thakur, C. P. Sanjay, Maddikera Kalyan Chakravarthi Understanding IoT Security: A Point-by-point Investigation of IoT Weaknesses and a First Exact Glance at Web Scale IoT Exploits. Search on Bibsonomy IC3I The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Matteo Italia, Fabio Dercole Optimal control of two cytotoxic drug maximum tolerated dose steers and exploits cancer adaptive resistance in a cell-based framework. Search on Bibsonomy ECC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Octavian Suciu, Connor Nelson, Zhuoer Lyu, Tiffany Bao, Tudor Dumitras Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2022 DBLP  BibTeX  RDF
19Chen Yan 0001, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji 0001, Wenyuan Xu 0001 Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2022 DBLP  BibTeX  RDF
19Yang Su, Damith C. Ranasinghe Leaving Your Things Unattended is No Joke! Memory Bus Snooping and Open Debug Interface Exploits. Search on Bibsonomy PerCom Workshops The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Arwa Abdulkarim Al Alsadi, Kaichi Sameshima, Jakob Bleier, Katsunari Yoshioka, Martina Lindorfer, Michel van Eeten, Carlos Hernandez Gañán No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis. Search on Bibsonomy AsiaCCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Amirreza Yousefzadeh, Manolis Sifalakis Delta Activation Layer exploits temporal sparsity for efficient embedded video processing. Search on Bibsonomy IJCNN The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Benjamin Drozdenko, Makia Powell Utilizing Deep Learning Techniques to Detect Zero Day Exploits in Network Traffic Flows. Search on Bibsonomy UEMCON The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19David Klein, Marius Musch, Thomas Barber, Moritz Kopmann, Martin Johns Accept All Exploits: Exploring the Security Impact of Cookie Banners. Search on Bibsonomy ACSAC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Prashant Anantharaman Protecting Systems From Exploits Using Language-Theoretic Security. Search on Bibsonomy 2022   RDF
19Tom McVey Browser exploits: ensuring safety when surfing. Search on Bibsonomy Netw. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Jie Wang 0037, Victor Magron, Jean-Bernard Lasserre TSSOS: A Moment-SOS Hierarchy That Exploits Term Sparsity. Search on Bibsonomy SIAM J. Optim. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Jie Wang 0037, Victor Magron, Jean-Bernard Lasserre Chordal-TSSOS: A Moment-SOS Hierarchy That Exploits Term Sparsity with Chordal Extension. Search on Bibsonomy SIAM J. Optim. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Wooseung Nam, Joohyun Lee, Ness B. Shroff, Kyunghan Lee An Inter-Data Encoding Technique that Exploits Synchronized Data for Network Applications. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Mingyu Guo, Guanhua Wang, Hideaki Hata, Muhammad Ali Babar 0001 Revenue maximizing markets for zero-day exploits. Search on Bibsonomy Auton. Agents Multi Agent Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Yasmany Prieto, Miguel E. Figueroa, Jorge E. Pezoa Maximizing Network Reliability to 0-Day Exploits Through a Heterogeneous Node Migration Strategy. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Mohammad Hallal, Mariette Awad, Pierre H. Khoueiry TempoMAGE: a deep learning framework that exploits the causal dependency between time-series data to predict histone marks in open chromatin regions at time-points with missing ChIP-seq datasets. Search on Bibsonomy Bioinform. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Tin Lai Rapidly-exploring Random Forest: Adaptively Exploits Local Structure with Generalised Multi-Trees Motion Planning. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
19Vittorio Lippi Deep Learning Based Model Identification System Exploits the Modular Structure of a Bio-Inspired Posture Control Model for Humans and Humanoids. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
19Octavian Suciu, Connor Nelson, Zhuoer Lyu, Tiffany Bao, Tudor Dumitras Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
19Stephen B. Wicker The ethics of zero-day exploits - : the NSA meets the trolley car. Search on Bibsonomy Commun. ACM The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Jan Van den Herrewegen, David F. Oswald, Flavio D. Garcia, Qais Temeiza Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Kjell Hausken, Jonathan W. Welburn Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Vittorio Lippi Deep Learning based Model Identification System Exploits the Modular Structure of a Bio-inspired Posture Control Model for Humans and Humanoids. Search on Bibsonomy ICPRAM The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Cainã Figueiredo, João Gabriel Lopes, Rodrigo Azevedo Santos, Gerson Zaverucha, Daniel Sadoc Menasché, Leandro Pfleger de Aguiar Software Vulnerabilities, Products and Exploits: A Statistical Relational Learning Approach. Search on Bibsonomy CSR The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Cristian Toma, Catalin Boja, Marius Popa, Mihai Doinea, Cristian Ciurea Viruses, Exploits, Malware and Security Issues on IoT Devices. Search on Bibsonomy SecITC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Carter Yagemann, Matthew Pruett, Simon P. Chung, Kennon Bittick, Brendan Saltaformaggio, Wenke Lee ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2021 DBLP  BibTeX  RDF
19Shangcheng Shi, Xianbo Wang, Kyle Zeng, Ronghai Yang, Wing Cheong Lau An Empirical Study on Mobile Payment Credential Leaks and Their Exploits. Search on Bibsonomy SecureComm (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Bramwell Brizendine, Austin Babcock A Novel Method for the Automatic Generation of JOP Chain Exploits. Search on Bibsonomy NCS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Josh Huddleston, Pu Ji, Suman Bhunia, Joel Cogan How VMware Exploits Contributed to SolarWinds Supply-chain Attack. Search on Bibsonomy CSCI The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Pin Lyu, Wandong Cai, Yao Wang 0005 Active Attack that Exploits Biometric Similarity Difference and Basic Countermeasures. Search on Bibsonomy ADHOCNETS/TRIDENTCOM The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Tuong Phi Lau Software Reuse Exploits in Node.js Web Apps. Search on Bibsonomy ICSRS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Salman Ahmed 0001, Long Cheng 0005, Hans Liljestrand, N. Asokan, Danfeng Daphne Yao Tutorial: Investigating Advanced Exploits for System Security Assurance. Search on Bibsonomy SecDev The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Falin Hou, Xiao Yu, Kefan Qiu, Junli Liu, Zhiwei Shi, Yuanzhang Li Research on Off-Path Exploits of Network Protocols. Search on Bibsonomy DMBD (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Asmit De, Mohammad Nasim Imtiaz Khan, Karthikeyan Nagarajan, Swaroop Ghosh HarTBleed: Using Hardware Trojans for Data Leakage Exploits. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Xueyan Wang, Jianlei Yang 0001, Yinglin Zhao, Xiaotao Jia, Gang Qu 0001, Weisheng Zhao Hardware Security in Spin-based Computing-in-memory: Analysis, Exploits, and Mitigation Techniques. Search on Bibsonomy ACM J. Emerg. Technol. Comput. Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Mingyu Guo, Hideaki Hata, Ali Babar 0001 Revenue Maximizing Markets for Zero-Day Exploits. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
19Mingyu Guo, Hideaki Hata, Ali Babar 0001 Optimizing Affine Maximizer Auctions via Linear Programming: an Application to Revenue Maximizing Mechanism Design for Zero-Day Exploits Markets. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
19Xuewei Feng, Chuanpu Fu, Qi Li 0002, Kun Sun 0001, Ke Xu 0002 Off-Path TCP Exploits of the Mixed IPID Assignment. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
19Xueyan Wang, Jianlei Yang 0001, Yinglin Zhao, Xiaotao Jia, Gang Qu 0001, Weisheng Zhao Hardware Security in Spin-Based Computing-In-Memory: Analysis, Exploits, and Mitigation Techniques. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
Displaying result #1 - #100 of 5956 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license