Protocol fuzzing to find security vulnerabilities of RabbitMQ | 0 | 0.34 | 2021 |
Automatic Seed Generation based Hybrid Fuzzing for Code Coverage Efficiency. | 0 | 0.34 | 2020 |
A forensically robust data acquisition from a 10G line-rate network. | 0 | 0.34 | 2016 |
AIGG Threshold Based HTTP GET Flooding Attack Detection. | 3 | 0.47 | 2012 |
Malware classification method via binary content comparison | 13 | 0.69 | 2012 |
Executable Code Recognition in Network Flows Using Instruction Transition Probabilities | 1 | 0.35 | 2008 |
Function Call Mechanism Based Executable Code Detection for the Network Security | 1 | 0.35 | 2008 |
A practical approach for detecting executable codes in network traffic | 4 | 0.82 | 2007 |
Network-based real-time connection traceback system (NRCTS) with packet marking technology | 3 | 0.38 | 2003 |
A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation | 0 | 0.34 | 2001 |