|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1155 occurrences of 729 keywords
|
|
|
Results
Found 2062 publication records. Showing 2062 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
95 | Fu-Hau Hsu, Fanglu Guo, Tzi-cker Chiueh |
Scalable network-based buffer overflow attack detection. |
ANCS |
2006 |
DBLP DOI BibTeX RDF |
CTCP, generalized attack signatures, network-based intrusion detection, payload bypassing, return-into-libc attacks, buffer overflow attacks |
86 | Surupa Biswas, Thomas W. Carley, Matthew S. Simpson, Bhuvan Middha, Rajeev Barua |
Memory overflow protection for embedded systems using run-time checks, reuse, and compression. |
ACM Trans. Embed. Comput. Syst. |
2006 |
DBLP DOI BibTeX RDF |
Out-of-memory errors, reliability, data compression, reuse, run-time checks, heap overflow, stack overflow |
84 | Per-Åke Larson |
Analysis of Index-Sequential Files with Overflow Chaining. |
ACM Trans. Database Syst. |
1981 |
DBLP DOI BibTeX RDF |
ISAM, index sequential files, indexed sequential access method, overflow chaining, overflow handling, performance analysis, analytic model, analysis of algorithms, file organization, overflow, file structure |
79 | Yong-Joon Park, Gyungho Lee |
Repairing return address stack for buffer overflow protection. |
Conf. Computing Frontiers |
2004 |
DBLP DOI BibTeX RDF |
computer architecture, computer security, buffer overflow, intrusion tolerance |
71 | Han Zhou, Chong Hwa Ghang, Da Tong Han |
A dynamic bandwidth allocation scheme for ATM networks. |
ICCCN |
1995 |
DBLP DOI BibTeX RDF |
minimum overflow traffic algorithm, multiclass traffic environment, overflow traffic function, bandwidth assignment, mean overflow traffic to bandwidth ratio, optimization object function, average virtual cell loss probability, link capacity, quality of service, performance evaluation, asynchronous transfer mode, ATM networks, high throughput, dynamic bandwidth allocation |
69 | Deok Jin Kim, Tae-Hyung Kim, Jong Kim 0001, Sung Je Hong |
Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
Return Address, return-into-libc Attack, Data Injection Buffer Overflow Attack, Security, Randomization, Buffer Overflow, Instruction Set |
65 | Michel Mandjes, Ad Ridder |
A large deviations analysis of the transient of a queue with many Markov fluid inputs: approximations and fast simulation. |
ACM Trans. Model. Comput. Simul. |
2002 |
DBLP DOI BibTeX RDF |
importance sampling simulations, large deviations asymptotics, transient probabilities, buffer overflow, queuing theory, IP routers, calculus of variations, ATM multiplexers |
64 | Vinaitheerthan Sundaram, Sandip HomChaudhuri, Sachin Garg, Chandra M. R. Kintala, Saurabh Bagchi |
Improving Dependability Using Shared Supplementary Memory and Opportunistic Micro Rejuvenation in Multi-tasking Embedded Systems. |
PRDC |
2007 |
DBLP DOI BibTeX RDF |
resource constrained fault-tolerance, embedded systems, software rejuvenation, heap overflow, stack overflow |
63 | Yongjian Hu, Heung-Kyu Lee, Jianwei Li |
DE-Based Reversible Data Hiding With Improved Overflow Location Map. |
IEEE Trans. Circuits Syst. Video Technol. |
2009 |
DBLP DOI BibTeX RDF |
|
62 | Tzu-Rung Lee, Kwo-Cheng Chiu, Da-Wei Chang |
A Lightweight Buffer Overflow Protection Mechanism with Failure-Oblivious Capability. |
ICA3PP |
2009 |
DBLP DOI BibTeX RDF |
Failure-Oblivious Computing, Guard Pages, Network Security, Self Reconfiguration, Buffer Overflow Attacks |
62 | Andrzej Chydzinski |
Time to Buffer Overflow in an MMPP Queue. |
Networking |
2007 |
DBLP DOI BibTeX RDF |
MMPP queue, Performance evaluation, buffer overflow |
62 | Shensheng Tang, Wei Wayne Li |
Modeling and analysis of hierarchical cellular networks with bidirectional overflow and take-back strategies under generally distributed cell residence times. |
Telecommun. Syst. |
2006 |
DBLP DOI BibTeX RDF |
Take-back, Channel occupancy time, Handoff, Overflow, Cell residence time, Hierarchical cellular networks |
62 | Wenhao Shan, Pingzhi Fan, Yi Pan 0001 |
Performance Evaluation of a Hierarchical Cellular System with Mobile Velocity-Based Bidirectional Call-Overflow Scheme. |
IEEE Trans. Parallel Distributed Syst. |
2003 |
DBLP DOI BibTeX RDF |
Hierarchical cellular system, guard channel, Markov process, overflow |
62 | Thomas Toth, Christopher Krügel |
Accurate Buffer Overflow Detection via Abstract Payload Execution. |
RAID |
2002 |
DBLP DOI BibTeX RDF |
Intrusion Detecion, Buffer Overflow Exploit, Network Security |
62 | Michael J. Schulte, Pablo I. Balzola, Ahmet Akkas, Robert W. Brocato |
Integer Multiplication with Overflow Detection or Saturation. |
IEEE Trans. Computers |
2000 |
DBLP DOI BibTeX RDF |
unsigned, tree multipliers, computer arithmetic, array multipliers, Overflow, saturation, integer, two's complement |
61 | Surupa Biswas, Matthew S. Simpson, Rajeev Barua |
Memory overflow protection for embedded systems using run-time checks, reuse and compression. |
CASES |
2004 |
DBLP DOI BibTeX RDF |
out-of-memory errors, reliability, data compression, reuse, runtime checks, heap overflow, stack overflow |
55 | Babak Salamat, Andreas Gal, Todd Jackson, Karthikeyan Manivannan, Gregor Wagner, Michael Franz |
Multi-variant Program Execution: Using Multi-core Systems to Defuse Buffer-Overflow Vulnerabilities. |
CISIS |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Martin C. Rinard, Cristian Cadar, Daniel Dumitran, Daniel M. Roy 0001, Tudor Leu |
A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors). |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
55 | Zili Shao, Qingfeng Zhuge, Yi He 0001, Edwin Hsing-Mean Sha |
Defending Embedded Systems Against Buffer Overflow via Hardware/Software. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
55 | Tzi-cker Chiueh, Fu-Hau Hsu |
RAD: A Compile-Time Solution to Buffer Overflow Attacks. |
ICDCS |
2001 |
DBLP DOI BibTeX RDF |
|
54 | Mustafa Gök, Michael J. Schulte, Mark G. Arnold |
Integer Multipliers with Overflow Detection. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
high-speed arithmetic algorithms, overflow detection, Computer arithmetic, multiplication, combinational logic |
54 | Zili Shao, Chun Xue, Qingfeng Zhuge, Mei Kang Qiu, Bin Xiao 0001, Edwin Hsing-Mean Sha |
Security Protection and Checking for Embedded System Integration against Buffer Overflow Attacks via Hardware/Software. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
hardware/software, Security, embedded system, protection, buffer overflow attack |
54 | Krerk Piromsopa, Richard J. Enbody |
Secure Bit: Transparent, Hardware Buffer-Overflow Protection. |
IEEE Trans. Dependable Secur. Comput. |
2006 |
DBLP DOI BibTeX RDF |
Buffer overflow, security and protection, security kernels, invasive software |
54 | Mustapha Refai |
Exploiting a buffer overflow using metasploit framework. |
PST |
2006 |
DBLP DOI BibTeX RDF |
metasploit, framework, buffer overflow, exploit, buffer overrun |
54 | Yi-Bing Lin |
Eliminating Overflow for Large-Scale Mobility Databases in Cellular Telephone Networks. |
IEEE Trans. Computers |
2001 |
DBLP DOI BibTeX RDF |
Cellular telephone network, database overflow, visitor location register, home location register, large-scale database |
47 | Yoonseo Choi, Hwansoo Han |
Optimal register reassignment for register stack overflow minimization. |
ACM Trans. Archit. Code Optim. |
2006 |
DBLP DOI BibTeX RDF |
register stack, sequence graph, register allocation, Register assignment |
47 | Hiroyasu Nishiyama |
SecureC: Control-Flow Protection Against General Buffer Overflow Attack. |
COMPSAC (1) |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Bharat B. Madan, Shashi Phoha, Kishor S. Trivedi |
StackOFFence: A Technique for Defending Against Buffer Overflow Attacks. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Zili Shao, Chun Xue, Qingfeng Zhuge, Edwin Hsing-Mean Sha, Bin Xiao 0001 |
Efficient Array & Pointer Bound Checking Against Buffer Overflow Attacks via Hardware/Software. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Nathan Tuck, Brad Calder, George Varghese |
Hardware and Binary Modification Support for Code Pointer Protection From Buffer Overflow. |
MICRO |
2004 |
DBLP DOI BibTeX RDF |
|
47 | Lynn Choi, Yong Shin |
Enforcement of Architectural Safety Guards to Deter Malicious Code Attacks through Buffer Overflow Vulnerabilities. |
ARCS |
2004 |
DBLP DOI BibTeX RDF |
|
47 | Jiahua Zhu, HongJiang Zhang, Hui Shi, Binyu Zang, Chuanqi Zhu |
Overflow Controlled SIMD Arithmetic. |
LCPC |
2004 |
DBLP DOI BibTeX RDF |
|
47 | Ioannis Ch. Paschalidis, Spyridon Vassilaras |
Model-based estimation of buffer overflow probabilities from measurements. |
SIGMETRICS/Performance |
2001 |
DBLP DOI BibTeX RDF |
Akaike's information criterion, estimation, large deviations, effective bandwidth, Markov-modulated processes |
45 | Mariusz Glabowski, Katarzyna Kubasik, Maciej Stasiak |
Modeling of systems with overflow multi-rate traffic. |
Telecommun. Syst. |
2008 |
DBLP DOI BibTeX RDF |
Overflow traffic, Multiservice systems, Kaufman-Roberts recursion |
45 | Hossain Shahriar, Mohammad Zulkernine |
Mutation-Based Testing of Buffer Overflow Vulnerabilities. |
COMPSAC |
2008 |
DBLP DOI BibTeX RDF |
Mutation-based testing, Vulnerabilities, Buffer overflow |
45 | Kelvin Ku, Thomas E. Hart, Marsha Chechik, David Lie |
A buffer overflow benchmark for software model checkers. |
ASE |
2007 |
DBLP DOI BibTeX RDF |
model checking, benchmark, buffer overflow, array bounds checking |
45 | Yong-Joon Park, Zhao Zhang, Gyungho Lee |
Microarchitectural Protection Against Stack-Based Buffer Overflow Attacks. |
IEEE Micro |
2006 |
DBLP DOI BibTeX RDF |
Microarchitectural protection, stack-based, buffer overflow, RAS |
45 | Andreas Brandt 0001, Manfred Brandt |
Individual Overflow and Freed Carried Traffics for a Link with Trunk Reservation. |
Telecommun. Syst. |
2005 |
DBLP DOI BibTeX RDF |
overflow traffic, freed carried traffic, factorial moments, peakedness, two-moment method, circuit switched network, trunk reservation |
45 | Yongsu Park, Yookun Cho |
An Efficient Pointer Protection Scheme to Defend Buffer Overflow Attacks. |
PARA |
2004 |
DBLP DOI BibTeX RDF |
randomization, buffer overflow, system security |
45 | Andrew T. Phillips, Jack S. Eddy Tan |
Exploring security vulnerabilities by exploiting buffer overflow using the MIPS ISA. |
SIGCSE |
2003 |
DBLP DOI BibTeX RDF |
security, pedagogy, buffer overflow |
44 | A. Landauro, J. Liénard |
An Overflow Detection and Correction in Digital Filters. |
IEEE Trans. Computers |
1975 |
DBLP DOI BibTeX RDF |
overflow detection, overflow oscillations, serial-parallel multiplier, Digital filters |
41 | Devang Jariwala, John Lillis |
Trunk decomposition based global routing optimization. |
ICCAD |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Qian Huang 0003, King-Tim Ko, Villy Bæk Iversen |
An Approximation Method for Multiservice Loss Performance in Hierarchical Networks. |
ITC |
2007 |
DBLP DOI BibTeX RDF |
overlay network, Hierarchical network, overflow |
40 | Wilfred W. K. Lin, Allan K. Y. Wong, Tharam S. Dillon |
A Novel Traffic Independent NNC for Dynamic Buffer Tuning to Shorten the RTT of a TCP Channel. |
ICITA (2) |
2005 |
DBLP DOI BibTeX RDF |
PIDC, dynamic buffer tuning, traffic pattern independent, buffer overflow, active queue management, Neural Network Controller |
40 | Douglas M. Priest |
Efficient scaling for complex division. |
ACM Trans. Math. Softw. |
2004 |
DBLP DOI BibTeX RDF |
Complex division, underflow, overflow |
40 | Bárbara González-Arévalo |
Performance of a Leaky Bucket System with Long-Range Dependent Input Traffic. |
Queueing Syst. Theory Appl. |
2004 |
DBLP DOI BibTeX RDF |
time until overflow, flow control, long-range dependence, finite buffer, heavy tails, leaky bucket, fluid queue |
40 | May T. W. Ip, Wilfred W. K. Lin, Allan K. Y. Wong, Tharam S. Dillon, Dianhui Wang |
An Adaptive Buffer Management Algorithm for Enhancing Dependability and Performance in Mobile-Object-Based Real-Time Computing . |
ISORC |
2001 |
DBLP DOI BibTeX RDF |
MORC, P+I+D control algorithm, Convergence Algorithm, adaptive, buffer overflow |
40 | Michael Weber, Viren Shah, Chris Ren |
A Case Study in Detecting Software Security Vulnerabilities Using Constraint Optimization. |
SCAM |
2001 |
DBLP DOI BibTeX RDF |
static analysis, buffer overflow, software security, software certification |
39 | Bhuvan Middha, Matthew S. Simpson, Rajeev Barua |
MTSS: Multitask stack sharing for embedded systems. |
ACM Trans. Embed. Comput. Syst. |
2008 |
DBLP DOI BibTeX RDF |
Out-of-memory errors, cactus stack, meshed stack, reliability, data compression, reuse, virtual memory, runtime checks, heap overflow, stack overflow |
38 | Sirisara Chiamwongpaet, Krerk Piromsopa |
The implementation of Secure Canary Word for buffer-overflow protection. |
EIT |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Wei Le, Mary Lou Soffa |
Marple: a demand-driven path-sensitive buffer overflow detector. |
SIGSOFT FSE |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Wei Le, Mary Lou Soffa |
Refining buffer overflow detection via demand-driven path-sensitive analysis. |
PASTE |
2007 |
DBLP DOI BibTeX RDF |
path-sensitive, demand-driven, infeasible paths |
38 | João Durães, Henrique Madeira |
A Methodology for the Automated Identification of Buffer Overflow Vulnerabilities in Executable Software Without Source-Code. |
LADC |
2005 |
DBLP DOI BibTeX RDF |
|
38 | Phone Lin, Yi-Bing Lin, Imrich Chlamtac |
Overflow control for UMTS high-speed downlink packet access. |
IEEE Trans. Wirel. Commun. |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Ge Zhu, Akhilesh Tyagi |
Protection against Indirect Overflow Attacks on Pointers. |
IWIA |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Aishwarya Iyer, Lorie M. Liebrock |
Vulnerability Scanning for Buffer Overflow. |
ITCC (2) |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Zili Shao, Chun Xue, Qingfeng Zhuge, Edwin Hsing-Mean Sha, Bin Xiao 0001 |
Security Protection and Checking in Embedded System Integration Against Buffer Overflow Attacks. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Vahid Tabataba Vakili, Arash Aziminejad, Mohammad Reza Dehbozorgi |
A novel speed-sensitive bidirectional overflow and hand-down resource allocation strategy for hierarchical cellular networks. |
ISICT |
2003 |
DBLP BibTeX RDF |
hierarchical cellular structure, speed estimation and segregation, teletraffic performance, resource management |
38 | Yang-Seo Choi, Dong-il Seo, Sung Won Sohn |
A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
|
38 | Robert B. Cooper, Martin K. Solomon |
The Average Time Until Bucket Overflow. |
ACM Trans. Database Syst. |
1984 |
DBLP DOI BibTeX RDF |
|
37 | Michel Mandjes, Ad Ridder |
Optimal trajectory to overflow in a queue fed by a large number of sources. |
Queueing Syst. Theory Appl. |
1999 |
DBLP DOI BibTeX RDF |
large deviations asymptotics, queueing theory, buffer overflow, calculus of variations, ATM multiplexers |
33 | Yanheng Zhang, Yue Xu, Chris Chu |
FastRoute3.0: a fast and high quality global router based on virtual capacity. |
ICCAD |
2008 |
DBLP DOI BibTeX RDF |
|
33 | David Chase, Yossi Lev |
Dynamic circular work-stealing deque. |
SPAA |
2005 |
DBLP DOI BibTeX RDF |
deque, load balancing, lock-free, work stealing |
33 | Shuo Chen 0001, Zbigniew Kalbarczyk, Jun Xu 0003, Ravishankar K. Iyer |
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities. |
DSN |
2003 |
DBLP DOI BibTeX RDF |
data analysis, security vulnerabilities, finite state machine modeling |
33 | Ashok Rathi, Huizhu Lu, George E. Hedrick |
Performance Comparison of Extendible Hashing and Linear Hashing Techniques. |
SIGSMALL/PC Symposium |
1990 |
DBLP DOI BibTeX RDF |
|
32 | Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens, Sven Lachmund, Thomas Walter 0001 |
Breaking the memory secrecy assumption. |
EUROSEC |
2009 |
DBLP DOI BibTeX RDF |
buffer overread, probabilistic countermeasure, buffer overflow, systems security, bypass |
32 | Shang Ma, Jianhao Hu, Lin Zhang, Xiang Ling 0002 |
An efficient RNS parity checker for moduli set {2 n - 1, 2 n + 1, 22 n + 1} and its applications. |
Sci. China Ser. F Inf. Sci. |
2008 |
DBLP DOI BibTeX RDF |
number comparison, sign determination, overflow detection, VLSI, RNS, parity check |
32 | Weiwei Sun 0008, Yongrui Qin, Ping Yu 0001, Zhuoyao Zhang, Zhenying He |
HFilter: Hybrid Finite Automaton Based Stream Filtering for Deep and Recursive XML Data. |
DEXA |
2008 |
DBLP DOI BibTeX RDF |
XML stream filtering, deep and recursive XML data, hybrid finite automaton, data prefix sharing, memory overflow control |
32 | Dimitar Radev, Elena Rashkova |
Computer simulation of rare event for M/M/1/N queuing system. |
CompSysTech |
2007 |
DBLP DOI BibTeX RDF |
Markov chains, simulation modeling, queuing theory, rare event, overflow probability |
32 | Yongsu Park, Younho Lee, Heeyoul Kim, Gil-Joo Lee, Il-Hee Kim |
Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
computer architecture, computer security, buffer overflow attack |
32 | Yongsu Park, Yong Ho Song, Eul-Gyu Im |
Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
computer architecture, computer security, buffer overflow attack |
32 | Chu Chao, Qin Zhang, Yingke Xie, Chengde Han |
Design of a high performance FFT processor based on FPGA. |
ASP-DAC |
2005 |
DBLP DOI BibTeX RDF |
FFT processor, overflow control, FPGA, address generation |
32 | Belka Kraimeche, Habiba Skalli |
A frequency-hopping scheme for interference control in a GSM/GPRS network. |
WMuNeP |
2005 |
DBLP DOI BibTeX RDF |
interference control, GSM, GPRS, frequency hopping, overflow |
32 | Nikolai Joukov, Aditya Kashyap, Gopalan Sivathanu, Erez Zadok |
An electric fence for kernel buffers. |
StorageSS |
2005 |
DBLP DOI BibTeX RDF |
security, file systems, buffer overflow |
32 | Ozcan Ozturk 0002, Ravi Mazumdar, Nikolay B. Likhanov |
Many Sources Asymptotics for Networks with Small Buffers. |
Queueing Syst. Theory Appl. |
2004 |
DBLP DOI BibTeX RDF |
many sources asymptotics, overflow probabilities, large deviation principle |
32 | Do Young Eun, Ness B. Shroff |
A measurement-analytic approach for QoS estimation in a network based on the dominant time scale. |
IEEE/ACM Trans. Netw. |
2003 |
DBLP DOI BibTeX RDF |
dominant time scale (DTS), measurements, Gaussian processes, stopping criterion, overflow probability |
32 | Boris Igelnik, Yaakov Kogan, Vladimir Kriman, Debasis Mitra 0001 |
A new computational approach for stochastic fluid models of multiplexers with heterogeneous sources. |
Queueing Syst. Theory Appl. |
1995 |
DBLP DOI BibTeX RDF |
buffer overflow probability, two-dimensional interpolating polynomials, Fluid models, ATM multiplexing, recursive computation |
32 | Alexander Birman, H. Richard Gail, Sidney L. Hantler, Zvi Rosberg, Moshe Sidi |
An Optimal Service Policy for Buffer Systems. |
J. ACM |
1995 |
DBLP DOI BibTeX RDF |
gradual input, multiplexor, switch, buffer overflow, parallel queues, service discipline |
31 | Bhuvan Middha, Matthew S. Simpson, Rajeev Barua |
MTSS: multi task stack sharing for embedded systems. |
CASES |
2005 |
DBLP DOI BibTeX RDF |
cactus stack, meshed stack, out-of-memory, reliability, reuse, runtime checks, heap overflow, stack overflow |
31 | Carol A. Niznik |
A Quantization Approximation for Modeling Computer Network Nodal Queueing Delay. |
IEEE Trans. Computers |
1983 |
DBLP DOI BibTeX RDF |
staircase function, Average Fractional Overflow, GI/ G1, Peak Measurement Accuracy, Peak Measurement Complexity, Markov Chain, quantization, buffer overflow, queueing system, mean waiting time |
31 | Harvey L. Garner |
Theory of Computer Addition and Overflows. |
IEEE Trans. Computers |
1978 |
DBLP DOI BibTeX RDF |
overflow behavior, Additive identity, compute through overflow (CTO), models of computer arithmetic, computer arithmetic, number systems |
30 | Huang-Yu Chen, Chin-Hsiung Hsu, Yao-Wen Chang |
High-performance global routing with fast overflow reduction. |
ASP-DAC |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Chung-Ping Chung, Tung-Lin Lu, Hui-Chin Yang |
H-Buffer: An Efficient History-Based and Overflow Sharing Transparent Fragment Storage Method. |
CSE (2) |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Gang Uk Hwang |
Analysis of Medium Access Delay and Packet Overflow Probability in IEEE 802.11 Networks. |
NEW2AN |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Mariusz Glabowski, Katarzyna Kubasik, Maciej Stasiak |
Modeling of Systems with Overflow Multi-Rate Traffic. |
AICT |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Seon Wook Kim, Chong-liang Ooi, Rudolf Eigenmann, Babak Falsafi, T. N. Vijaykumar |
Exploiting reference idempotency to reduce speculative storage overflow. |
ACM Trans. Program. Lang. Syst. |
2006 |
DBLP DOI BibTeX RDF |
Idempotent references, compiler-assisted speculative execution, speculation |
30 | Victor F. Nicola, Tatiana S. Zaburnenko |
Efficient simulation of population overflow in parallel queues. |
WSC |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Koji Inoue |
Energy-security tradeoff in a secure cache architecture against buffer overflow attacks. |
SIGARCH Comput. Archit. News |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Andrzej Chydzinski, Ryszard Winiarczyk |
Distribution of the First Buffer Overflow Time in a Deterministic Service Time Queue. |
ISCC |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Wilfred W. K. Lin, Allan K. Y. Wong, Tharam S. Dillon |
FLC: A Novel Dynamic Buffer Tuner for Shortening Service Roundtrip Time over the Internet by Eliminating User-Level Buffer Overflow on the Fly. |
APPT |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Stelios Sidiroglou, Giannis Giovanidis, Angelos D. Keromytis |
A Dynamic Mechanism for Recovering from Buffer Overflow Attacks. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Archana Pasupulati, Jason Coit, Karl N. Levitt, Shyhtsun Felix Wu, S. H. Li, J. C. Kuo, K. P. Fan |
Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities. |
NOMS (1) |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Alexander A. Kist, Richard J. Harris 0002 |
Cost efficient overflow routing for outbound ISP traffic. |
ISCC |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Changwoo Pyo, Byungchul Bae, Taejin Kim, Gyungho Lee |
Run-time Detection of Buffer Overflow Attacks without Explicit Sensor Data Objects. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Lennart Harnefors, Johnny Holmberg, Svante Signell |
Suppression of overflow limit cycles in LDI allpass/lattice filters. |
ISCAS (3) |
1999 |
DBLP DOI BibTeX RDF |
|
30 | Per-Åke Larson |
Linear Hashing with Overflow-Handling by Linear Probing. |
ACM Trans. Database Syst. |
1985 |
DBLP DOI BibTeX RDF |
|
29 | Xinran Wang, Chi-Chun Pan, Peng Liu 0005, Sencun Zhu |
SigFree: A Signature-Free Buffer Overflow Attack Blocker. |
IEEE Trans. Dependable Secur. Comput. |
2010 |
DBLP DOI BibTeX RDF |
Intrusion detection, code-injection attacks, buffer overflow attacks |
29 | Krerk Piromsopa, Sirisara Chiamwongpaet |
Secure Bit Enhanced Canary: Hardware Enhanced Buffer-Overflow Protection. |
NPC Workshops |
2008 |
DBLP DOI BibTeX RDF |
Security, Protection, Buffer overflow, security kernels, invasive software |
29 | A. B. Dieker, Michel Mandjes |
Fast simulation of overflow probabilities in a queue with Gaussian input. |
ACM Trans. Model. Comput. Simul. |
2006 |
DBLP DOI BibTeX RDF |
Asymptotic efficiency, queueing theory, importance sampling, large deviations, Gaussian processes, overflow probability |
29 | Changwoo Pyo, Gyungho Lee |
Encoding Function Pointers and Memory Arrangement Checking against Buffer Overflow Attack. |
ICICS |
2002 |
DBLP DOI BibTeX RDF |
program counter, function pointer encoding, memory arrangement checking, buffer overflow attack |
Displaying result #1 - #100 of 2062 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|