LeanSym - Efficient Hybrid Fuzzing Through Conservative Constraint Debloating. | 0 | 0.34 | 2021 |
KameleonFuzz: evolutionary fuzzing for black-box XSS detection | 20 | 0.80 | 2014 |
Combining Static and Dynamic Analysis for Vulnerability Detection | 2 | 0.38 | 2013 |
A Stack Model for Symbolic Buffer Overflow Exploitability Analysis | 1 | 0.37 | 2013 |
XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing | 18 | 0.87 | 2012 |
Finding Buffer Overflow Inducing Loops in Binary Executables | 9 | 0.65 | 2012 |
A blind watermarking algorithm based on fractional Fourier transform and visual cryptography | 44 | 1.28 | 2012 |
Offset-Aware Mutation Based Fuzzing for Buffer Overflow Vulnerabilities: Few Preliminary Results | 8 | 0.64 | 2011 |
A Chaos-Based Robust Watermarking Algorithm For Rightful Ownership Protection | 4 | 0.40 | 2011 |
Digital Watermarking Based Stereo Image Coding | 0 | 0.34 | 2010 |
DCT and SVD Based New Watermarking Scheme | 2 | 0.43 | 2010 |
Application security code analysis: a step towards software assurance | 0 | 0.34 | 2009 |
Danger theory based SYN flood attack detection in autonomic network | 5 | 0.48 | 2009 |
Network traffic analysis using singular value decomposition and multiscale transforms | 7 | 0.49 | 2007 |
Use of dimensionality reduction for intrusion detection | 1 | 0.40 | 2007 |
On the Use of Singular Value Decomposition for a Fast Intrusion Detection System | 6 | 0.58 | 2006 |
A fast host-based intrusion detection system using rough set theory | 10 | 0.76 | 2005 |
Network intrusion detection using wavelet analysis | 5 | 0.63 | 2004 |
Frequency- and ordering-based similarity measure for host-based intrusion detection | 4 | 0.42 | 2004 |