Sign in

Communication-Traffic-Assisted Mining and Exploitation of Buffer Overflow Vulnerabilities in ADASs.

Yufeng LiMengxiao LiuChenhong CaoJiangtao Li
Published in: Future Internet (2023)
Keyphrases
  • buffer overflow
  • security problems
  • data corruption
  • rare events
  • data mining
  • information sharing
  • computer networks
  • knowledge discovery
  • network traffic
  • data management
  • data mining techniques