Search Results - "exploit"
-
1
ExpGen: A 2-Step Vulnerability Exploitability Evaluation Solution for Binary Programs under ASLR Environment
Published in Applied Sciences (2022-06-01)Subjects: “…partial exploit…”
Get full text
Article -
2
AEMB: An Automated Exploit Mitigation Bypassing Solution
Published in Applied Sciences (2021-10-01)Subjects: “…exploit mitigation…”
Get full text
Article -
3
Bacteria Exploit Autophagy For Their Own Benefit
Published in Infection and Drug Resistance (2019-10-01)Subjects: “…Exploit…”
Get full text
Article -
4
Understanding and Classifying Permanent Denial-of-Service Attacks
Published in Journal of Cybersecurity and Privacy (2024-05-01)Subjects: “…exploit…”
Get full text
Article -
5
AppChainer: investigating the chainability among payloads in android applications
Published in Cybersecurity (2023-08-01)Subjects: “…Vulnerability exploit…”
Get full text
Article -
6
L’influence de la télévision et de la radio publique sur les attentes sportives du public : l’exemple de Christine « Kiki » Caron lors de Jeux Olympiques de Tokyo en 1964
Published in Materiales para la Historia del Deporte (2024-07-01)Subjects: “…exploit…”
Get full text
Article -
7
Perspectives and Reviews in the Development and Evolution of the Zero-Day Attacks
Published in Informatică economică (2022-01-01)Subjects: “…exploit…”
Get full text
Article -
8
CanaryExp: A Canary-Sensitive Automatic Exploitability Evaluation Solution for Vulnerabilities in Binary Programs
Published in Applied Sciences (2023-11-01)Subjects: “…automatic exploit generation…”
Get full text
Article -
9
Better Not to Use Vulnerability’s Reference for Exploitability Prediction
Published in Applied Sciences (2020-04-01)Subjects: “…exploit…”
Get full text
Article -
10
The Relevance of Bibliometric Analysis to Discover the Area’s Research Efforts: Root Exploit Evolution
Published in JOIV: International Journal on Informatics Visualization (2022-08-01)Subjects: “…root exploit…”
Get full text
Article -
11
From proof-of-concept to exploitable
Published in Cybersecurity (2019-03-01)Subjects: “…Exploit…”
Get full text
Article -
12
Cybersecurity of remote work migration: A study on the VPN security landscape post Covid-19 outbreak
Published in Array (2025-09-01)Subjects: “…VPN exploit…”
Get full text
Article -
13
Electrophysiological Markers of Aberrant Cue-Specific Exploration in Hazardous Drinkers
Published in Computational Psychiatry (2023-07-01)Subjects: “…explore-exploit…”
Get full text
Article -
14
Account Abstraction: The Key to Blockchain Reporting
Published in Informatică economică (2024-01-01)Subjects: “…exploit…”
Get full text
Article -
15
An Exploit Traffic Detection Method Based on Reverse Shell
Published in Applied Sciences (2023-06-01)Subjects: “…exploit…”
Get full text
Article -
16
ANALYSIS OF THE MAIN ASPECTS OF THE IMPACT OF DoS-ATTACKS ON COMPUTER NETWORK PERFORMANCE
Published in Sučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni (2013-11-01)Subjects: “…exploit…”
Get full text
Article -
17
Any Bluetooth device can be hacked. Know how?
Published in Cyber Security and Applications (2024-01-01)Subjects: “…Exploit…”
Get full text
Article -
18
Blockchain Based DApps for Education
Published in Informatică economică (2024-01-01)Subjects: “…exploit…”
Get full text
Article -
19
Semantic Restoration and Automatic Transplant for ROP Exploit Script
Published in Jisuanji kexue (2022-11-01)Subjects: “…exploit script|control flow hijack|return-orinted programming|transplanting…”
Get full text
Article -
20
Priming exploration across domains: does search in a spatial environment influence search in a cognitive environment?
Published in Royal Society Open Science (2021-08-01)Subjects: “…explore–exploit…”
Get full text
Article
