Author:
Andersson S.,Clark A.,Mohay G.,Schatz B.,Zimmermann J.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Association Rules for Buffer Overflow Vulnerability Detection Using Machine Learning;Proceedings of Eighth International Congress on Information and Communication Technology;2023-09-15
2. Shredder;Proceedings of the 34th Annual Computer Security Applications Conference;2018-12-03
3. A Survey on Function and System Call Hooking Approaches;Journal of Hardware and Systems Security;2017-06
4. A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions;The Journal of Supercomputing;2016-09-07
5. Semantics-aware detection of targeted attacks: a survey;Journal of Computer Virology and Hacking Techniques;2016-05-02