共 50 条
- [41] Preventing Kernel Code-Reuse Attacks Through Disclosure Resistant Code Diversification 2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 189 - 197
- [42] A New Approach for Detecting DDoS Attacks Based on Wavelet Analysis PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOLS 1-9, 2009, : 3774 - 3778
- [43] A rule-based approach for detecting heartbleed cyber attacks 2022 IEEE INTERNATIONAL SYMPOSIUM ON MEASUREMENTS & NETWORKING (M&N 2022), 2022,
- [44] Accurately detecting source code of attacks that increase privilege Lect. Notes Comput. Sci., (104-116):
- [46] A framework for detecting network-based code injection attacks targeting windows and UNIX 21st Annual Computer Security Applications Conference, Proceedings, 2005, : 41 - 50
- [48] Mitigating Code-Reuse Attacks with Control-Flow Locking 27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), 2011, : 353 - 362
- [49] Detecting Code Reuse in Android Applications Using Component-Based Control Flow Graph ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 142 - 155
- [50] An unsupervised approach for detecting DDoS attacks based on traffic-based metrics 2005 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING (PACRIM), 2005, : 462 - 465