Sciweavers

1101 search results - page 16 / 221
» On the Security and Vulnerability of PING
Sort
View
53
Voted
SIGCSE
2003
ACM
121views Education» more  SIGCSE 2003»
15 years 7 months ago
Exploring security vulnerabilities by exploiting buffer overflow using the MIPS ISA
Andrew T. Phillips, Jack S. E. Tan
IFIP
2001
Springer
15 years 6 months ago
Security Vulnerabilities and System Intrusions - The Need for Automatic Response Frameworks
Steven Furnell, Maria Papadaki, G. Magklaras, A. A...
60
Voted
HICSS
2010
IEEE
114views Biometrics» more  HICSS 2010»
15 years 3 months ago
Measuring Similarity for Security Vulnerabilities
Ju An Wang, Linfeng Zhou, Minzhe Guo, Hao Wang, Ja...
CORR
2010
Springer
52views Education» more  CORR 2010»
15 years 1 months ago
Vulnerability of MRD-Code-based Universal Secure Network Coding against Stronger Eavesdroppers
Eitaro Shioji, Ryutaroh Matsumoto, Tomohiko Uyemat...
COMPSEC
2007
66views more  COMPSEC 2007»
15 years 1 months ago
Measuring, analyzing and predicting security vulnerabilities in software systems
Omar H. Alhazmi, Yashwant K. Malaiya, Indrajit Ray