您当前的位置:
首页 >
文章列表页 >
Exploit detection based on illegal control flow transfers identification
PaperⅠ Network attack and Prevention | 更新时间:2024-06-05
    • Exploit detection based on illegal control flow transfers identification

    • Journal on Communications   Vol. 35, Issue 9, Pages: 20-31(2014)
    • DOI:10.3969/j.issn.1000-436x.2014.09.003    

      CLC: TP399
    • Online First:2014-09

      Published:25 September 2014

    移动端阅览

  • Ming-hua WANG, Ling-yun YING, Deng-guo FENG. Exploit detection based on illegal control flow transfers identification[J]. Journal on Communications, 2014, 35(9): 20-31. DOI: 10.3969/j.issn.1000-436x.2014.09.003.

  •  
  •  

0

Views

2075

下载量

5

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Data poisoning attack detection approach for quality of service aware cloud API recommender system
LDoS attack detection method based on simple statistical features
Multitier ensemble classifiers for malicious network traffic detection
DDoS attack detection and defense based on hybrid deep learning model in SDN
Detection algorithm for cache pollution attacks based on node state model in content centric networking

Related Author

Wenchao QI
Taiyu BAO
Limin SHEN
Zhen CHEN
Xueyuan DUAN
Yu FU
Kun WANG
Bin LI

Related Institution

School of Information Science and Engineering, Yanshan University
Hebei Key Laboratory of Computer Virtual Technology and System Integration, Yanshan University
Department of Information Security, Naval University of Engineering
College of Computer and Information Technology, Xinyang Normal University
Henan Key Laboratory of Analysis and Applications of Education Big Data, Xinyang Normal University
0