Works matching IS 16112776 AND DT 2017 AND VI 59 AND IP 2
Results: 7
Vulnerability analysis.
- Published in:
- IT: Information Technology, 2017, v. 59, n. 2, p. 57, doi. 10.1515/itit-2016-0059
- By:
- Publication type:
- Article
Pattern-based methods for vulnerability discovery.
- Published in:
- IT: Information Technology, 2017, v. 59, n. 2, p. 101, doi. 10.1515/itit-2016-0037
- By:
- Publication type:
- Article
On the misuse of graphical user interface elements to implement security controls.
- Published in:
- IT: Information Technology, 2017, v. 59, n. 2, p. 59, doi. 10.1515/itit-2016-0036
- By:
- Publication type:
- Article
Exploitation as code reuse: On the need of formalization.
- Published in:
- IT: Information Technology, 2017, v. 59, n. 2, p. 93, doi. 10.1515/itit-2016-0038
- By:
- Publication type:
- Article
E-mail Header Injection Vulnerabilities.
- Published in:
- IT: Information Technology, 2017, v. 59, n. 2, p. 67, doi. 10.1515/itit-2016-0039
- By:
- Publication type:
- Article
Cross-architecture bug search in binary executables.
- Published in:
- IT: Information Technology, 2017, v. 59, n. 2, p. 83, doi. 10.1515/itit-2016-0040
- By:
- Publication type:
- Article
64-Bit Migration Vulnerabilities.
- Published in:
- IT: Information Technology, 2017, v. 59, n. 2, p. 73, doi. 10.1515/itit-2016-0041
- By:
- Publication type:
- Article