Login / Signup
Limits of Signature-Based Detection of Buffer Overflow Attacks.
Sungsu Kim
Kyubum Wee
Published in:
Security and Management (2003)
Keyphrases
</>
buffer overflow
data corruption
security problems
anomaly detection
rare events
countermeasures
data mining
active learning
training set
distributed systems
intrusion detection
detection algorithm
computer networks
error correction
computer security