Sign in

Defense against Stack-Based Attacks Using Speculative Stack Layout Transformation.

Benjamin D. RodesAnh Nguyen-TuongJason HiserJohn C. KnightMichele CoJack W. Davidson
Published in: RV (2012)
Keyphrases
  • databases
  • neural network
  • information retrieval
  • ddos attacks
  • data sets
  • real world
  • information systems
  • intrusion detection
  • computer networks
  • network security
  • countermeasures
  • chosen plaintext