×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [code injection attacks]
Documents
MICHALIS POLYCHRONAKIS(COLUMBIA UNIVERSITY,USA), KOSTAS G. ANAGNOSTAKIS(NIOMETRICS, SINGAPORE), EVANGELOS P. MARKATOS(FORTH-ICS, GREECE) ACSAC,2010 Comprehensive
225 views
Documents
N-Variant Systems A Secretless Framework for Security through Diversity Institute of Software Chinese Academy of Sciences 29 May 2006 David Evans
221 views
Documents
N-Variant Systems A Secretless Framework for Security through Diversity Beijing Institute of Technology 30 May 2006 David Evans
218 views
Documents
English Shellcode
70 views
Documents
Searching the Searchers with SearchAudit
34 views
Documents
BLADE, An Attack-Agnostic Approach for Preventing Drive-By Malware Infections
48 views
Documents
Exploiting diverse observation perspectives to get insights on the malware landscape
53 views
Documents
Detecting Spammers on Twitter
43 views
Documents
The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet
36 views
< Prev