S Bahram, X Jiang, Z Wang, M Grace… - 2010 29th IEEE …, 2010 - ieeexplore.ieee.org
Virtual machine (VM) introspection is a powerful technique for determining the specific aspects of guest VM execution from outside the VM. Unfortunately, existing introspection …
J Gionta, W Enck, P Ning - Proceedings of the 5th ACM Conference on …, 2015 - dl.acm.org
Memory disclosure vulnerabilities have become a common component for enabling reliable exploitation of systems by leaking the contents of executable data. Previous research …
AA Süzen - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
In this study, a hybrid deep belief network (DBN) cyber intrusion detection system was proposed to provide a secure network by controlling network traffic in Industrial control …
When a vulnerability is discovered in a system, some key questions often asked by the security analyst are what threat (s) does it pose, what attacks may exploit it, and which parts …
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Database-connected Web applications. To curtail the attackers' ability to …
S Li, W Wang, W Li, D Zhang - IEEE Access, 2023 - ieeexplore.ieee.org
Code Reuse Attacks (CRA) represent a type of control flow hijacking that attackers exploit to manipulate the standard program execution path, resulting in abnormal processor …
P Qiu, Y Lyu, J Zhang, D Wang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Control-flow integrity (CFI) plays a very important role in defending against code reuse attacks by protecting the control flows of programs from being hijacked. However, previous …
H Cox, R Pitre - Conference Record of the Thirty-First Asilomar …, 1997 - ieeexplore.ieee.org
Dominant mode rejection (DMR) is an approach to adaptive beamforming in which only the large eigenvalues of the correlation matrix and their eigenvectors are used. It requires fewer …
C Docan, M Parashar, J Cummings… - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
Managing the large volumes of data produced by emerging scientific and engineering simulations running on leadership-class resources has become a critical challenge. The …