Author:
Padmanabhuni Bindu,Tan Hee Beng Kuan
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. LsStk: Lightweight solution to preventing Stack from buffer overflow vulnerability;2023 17th International Conference on Open Source Systems and Technologies (ICOSST);2023-12-20
2. A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities;Scientific Programming;2020-09-27
3. Survivability Analysis of K-variant Architecture for Different Memory Attacks and Defense Strategies;IEEE Transactions on Dependable and Secure Computing;2019
4. Security Patterns from Intelligent Data: A Map of Software Vulnerability Analysis;2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS);2017-05
5. Detection of Infeasible Paths: Approaches and Challenges;Communications in Computer and Information Science;2013