Randomized instruction set emulation to disrupt binary code injection attacks
Proceedings of the 10th ACM conference on Computer and communications security
Detection and prevention of stack buffer overflow attacks
Communications of the ACM
Information security and computer systems: an integrated approach
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
Hi-index | 0.00 |
Enlist hacker expertise, but stay with academic fault naming conventions, when defending against the risk of exploitation of vulnerabilities and intrusions.