Found: 17
Select item for more details and to access through your institution.
Identifying exploitable memory objects for out‐of‐bound write vulnerabilities.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2024, v. 60, n. 5, p. 1, doi. 10.1049/ell2.13136
- By:
- Publication type:
- Article
Horus: An Effective and Reliable Framework for Code-Reuse Exploits Detection in Data Stream.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 20, p. 3363, doi. 10.3390/electronics11203363
- By:
- Publication type:
- Article
DualAC 2 NN: Revisiting and Alleviating Alert Fatigue from the Detection Perspective.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 10, p. N.PAG, doi. 10.3390/sym14102138
- By:
- Publication type:
- Article
Low‐complexity sphere decoding for MIMO‐SCMA systems.
- Published in:
- IET Communications (Wiley-Blackwell), 2021, v. 15, n. 4, p. 537, doi. 10.1049/cmu2.12085
- By:
- Publication type:
- Article
Security analysis of TLS protocol implementations based on model checking.
- Published in:
- Systems Engineering & Electronics, 2021, v. 43, n. 3, p. 839, doi. 10.12305/j.issn.1001-506X.2021.03.30
- By:
- Publication type:
- Article
Number of quantum measurement outcomes as a resource.
- Published in:
- Quantum Information Processing, 2020, v. 19, n. 11, p. 1, doi. 10.1007/s11128-020-02899-9
- By:
- Publication type:
- Article
Discover deeper bugs with dynamic symbolic execution and coverage‐based fuzz testing.
- Published in:
- IET Software (Wiley-Blackwell), 2018, v. 12, n. 6, p. 507, doi. 10.1049/iet-sen.2017.0200
- By:
- Publication type:
- Article
F: Towards full system high coverage fuzz testing on binary executables.
- Published in:
- PLoS ONE, 2018, v. 13, n. 5, p. 1, doi. 10.1371/journal.pone.0196733
- By:
- Publication type:
- Article
An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/4610320
- By:
- Publication type:
- Article
Assisting in Auditing of Buffer Overflow Vulnerabilities via Machine Learning.
- Published in:
- Mathematical Problems in Engineering, 2017, p. 1, doi. 10.1155/2017/5452396
- By:
- Publication type:
- Article
A model-guided symbolic execution approach for network protocol implementations and vulnerability detection.
- Published in:
- PLoS ONE, 2017, v. 12, n. 11, p. 1, doi. 10.1371/journal.pone.0188229
- By:
- Publication type:
- Article
Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.
- Published in:
- PLoS ONE, 2017, v. 12, n. 10, p. 1, doi. 10.1371/journal.pone.0186188
- By:
- Publication type:
- Article
Cryptanalysis and improvement of quantum private comparison of equality protocol without a third party.
- Published in:
- Quantum Information Processing, 2015, v. 14, n. 12, p. 4593, doi. 10.1007/s11128-015-1145-3
- By:
- Publication type:
- Article
TOA: a tag-owner-assisting RFID authentication protocol toward access control and ownership transfer.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 5, p. 934, doi. 10.1002/sec.965
- By:
- Publication type:
- Article
PRI: A Practical Reputation-based Incentive Scheme for Delay Tolerant Networks.
- Published in:
- KSII Transactions on Internet & Information Systems, 2012, v. 6, n. 4, p. 973, doi. 10.3837/tiis.2012.04.001
- By:
- Publication type:
- Article
QUANTUM SECURE DIRECT COMMUNICATION WITHOUT A PRE-ESTABLISHED SECURE QUANTUM CHANNEL.
- Published in:
- International Journal of Quantum Information, 2006, v. 4, n. 6, p. 925, doi. 10.1142/S0219749906002304
- By:
- Publication type:
- Article
QUANTUM SECURE DIRECT COMMUNICATION WITHOUT USING PERFECT QUANTUM CHANNEL.
- Published in:
- International Journal of Modern Physics C: Computational Physics & Physical Computation, 2006, v. 17, n. 5, p. 685, doi. 10.1142/S0129183106009011
- By:
- Publication type:
- Article