Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
A formalization-based vulnerability detection method for cross-subject network components
Chen, Jinfu, Xie, Haodi, Cai, Saihua, Geng, Ye, Yin, Yemin, Zhang, Zikang
Published in IEEE ... International Conference on Trust, Security and Privacy in Computing and Communications (Online) (01.12.2022)
Published in IEEE ... International Conference on Trust, Security and Privacy in Computing and Communications (Online) (01.12.2022)
Get full text
Conference Proceeding
Nearly optimal FIFO buffer management for two packet classes
Lotker, Zvi, Patt-Shamir, Boaz
Published in Computer networks (Amsterdam, Netherlands : 1999) (15.07.2003)
Published in Computer networks (Amsterdam, Netherlands : 1999) (15.07.2003)
Get full text
Journal Article
Defense Methodologies of AV Evasion for Access Control and Information Assurance in Industrial Distributed Control Systems and SCADA Systems
Pallimalli, Sai Krishna, Shaik, Arshad
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01.10.2014)
Get full text
Conference Proceeding
Goal-oriented dynamic test generation
Do, TheAnh, Khoo, Siau-Cheng, Fong, Alvis Cheuk Ming, Pears, Russel, Quan, Tho Thanh
Published in Information and software technology (01.10.2015)
Published in Information and software technology (01.10.2015)
Get full text
Journal Article
Wireless-powered communication under statistical quality of service constraints
Zewde, Tewodros A., Gursoy, M. Cenk
Published in IEEE International Conference on Communications (2003) (01.05.2016)
Published in IEEE International Conference on Communications (2003) (01.05.2016)
Get full text
Conference Proceeding
Journal Article
Assuring software security against buffer overflow attacks in embedded software development life cycle
Chul Su Park, Jae Hee Lee, Seong Chae Seo, Byung Ki Kim
Published in 2010 The 12th International Conference on Advanced Communication Technology (ICACT) (01.02.2010)
Get full text
Published in 2010 The 12th International Conference on Advanced Communication Technology (ICACT) (01.02.2010)
Conference Proceeding
Energy-Efficient Time Allocation for Wireless Energy Harvesting Communication Networks
Zewde, Tewodros A., Gursoy, M. Cenk
Published in 2016 IEEE Globecom Workshops (GC Wkshps) (01.12.2016)
Published in 2016 IEEE Globecom Workshops (GC Wkshps) (01.12.2016)
Get full text
Conference Proceeding