Program Anomaly Detection Against Data-Oriented Attacks
Memory-corruption vulnerability is one of the most common attack vectors used to compromise computer systems. Such vulnerabilities could lead to serious security problems and would remain an unsolved problem for a long time. Existing memory corruption attacks can be broadly classified into two categ...
Main Author: | Cheng, Long |
---|---|
Other Authors: | Computer Science |
Format: | Others |
Published: |
Virginia Tech
2018
|
Subjects: | |
Online Access: | http://hdl.handle.net/10919/84937 |
Similar Items
-
Multivariate Gaussian-Based False Data Detection Against Cyber-Attacks
by: Yu An, et al.
Published: (2019-01-01) -
Influence of Features on Accuracy of Anomaly Detection for an Energy Trading System
by: Hoon Ko, et al.
Published: (2021-06-01) -
A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection
by: Vibekananda Dutta, et al.
Published: (2020-08-01) -
Detecting Cyber Attacks in Smart Grids Using Semi-Supervised Anomaly Detection and Deep Representation Learning
by: Ruobin Qi, et al.
Published: (2021-08-01) -
Analysis of intrusion detection systems
by: NAZYM KENZHEGALIYEVNA ZHUMANGALIYEVA, et al.
Published: (2019-10-01)