Author:
Kananizadeh Shahrzad,Kononenko Kirill
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference42 articles.
1. Cowan, C., Wagle, F., Pu, C., Beattie, S., Walpole, J.: Buffer overflows: attacks and defenses for the vulnerability of the decade. In: DARPA Information Survivability Conference and Exposition, 2000. DISCEX ’00. Proceedings, vol. 2, pp. 119–129 (2000)
2. Homoliak, I., Ovsonka, D., Koranda, K., Hanacek, P.: Characteristics of buffer overflow attacks tunneled in http traffic. In 2014 International Carnahan Conference on Security Technology (ICCST), pp. 1–6 (2014)
3. Liu, J.J., Wang, Y.J.: Study on computer network intrusion effect evaluation. In: 2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control (IMCCC), pp. 349–353 (2013)
4. Khadka, R., Batlajery, B.V., Saeidi, A.M., Jansen, S., Hage, J.: How do professionals perceive legacy systems and software modernization? In: Proceedings of the 36th International Conference on Software Engineering, Ser. ICSE 2014, pp. 36–47. ACM, New York (2014). doi:
10.1145/2568225.2568318
5. Wang, S., Lo, D.: Version history, similar report, and structure: putting them together for improved bug localization. In: Proceedings of the 22nd International Conference on Program Comprehension, Ser. ICPC 2014, pp. 53–63. ACM, New York (2014). doi:
10.1145/2597008.2597148
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献