Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,747,645 papers from all fields of science
Search
Sign In
Create Free Account
Buffer overflow
Known as:
Buffer overruns
, Overflow
, Buffer overflows
Expand
In computer security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
48 relations
Aliasing (computing)
Application security
Attack patterns
Bitstream
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Realization of Buffer Overflow
An Zhiyuan
,
Liu Haiyan
International Forum on Information Technology and…
2010
Corpus ID: 28795659
In recent decades, the buffer overflow has been a source of many serious security issues. In recent years, by the CERT/CC…
Expand
2008
2008
Automatic Detection, Extraction and Recognition of Moving Objects
A. Khashman
2008
Corpus ID: 2982789
The security of restricted areas such as borders or buffer zones is of utmost importance; in particular with the worldwide…
Expand
2006
2006
Security vulnerability categories in major software systems
Omar H. Alhazmi
,
Sung-Whan Woo
,
Y. Malaiya
Communication, Network, and Information Security
2006
Corpus ID: 8257451
The security vulnerabilities in software systems can be categorized by either the cause or severity. Several software…
Expand
2006
2006
The Design and Use of Interactive Visualization Applets for Teaching Ciphers
Dino Schweitzer
,
Leemon Baird
IEEE Information Assurance Workshop
2006
Corpus ID: 17672802
Cryptography is a fundamental topic in an information assurance curriculum. Students should understand the basic concepts and…
Expand
2006
2006
Admission control approaches in the IMS presence service
M. Alam
,
Z. Wu
2006
Corpus ID: 7704826
In this research, we propose a weighted class based queuing (WCBQ) mechanism to provide class differentiation and to reduce the…
Expand
2000
2000
Buffer overflow probability for multiplexed on-off VoIP sources
J. Schormans
,
J. Pitts
,
E. Scharf
,
A. Pearmain
,
C. Phillips
2000
Corpus ID: 62701468
The authors analyse the multiplexing of a large number of independent and homogenous on-off traffic sources into a single packet…
Expand
1999
1999
On the Web: TCP Over Satellite - The Final Frontier
C. Metz
IEEE Internet Computing
1999
Corpus ID: 1112416
Communication satellites are now being used to transport TCP/IP traffic between distant locations, and to offer Internet access…
Expand
1996
1996
Minimizing Combined Sewer Overflows in Real-Time Control Applications
M. Pleau
,
François Méthot
,
A. Lebrun
,
H. Colas
1996
Corpus ID: 88495859
1994
1994
OVERFLOW QUEUES AND DELAYS WITH RANDOM AND PLATOONED ARRIVALS AT SIGNALIZED INTERSECTIONS
R. Akçelik
,
N. Rouphail
1994
Corpus ID: 65000757
The traditional two-term analytical model for predicting delays, queues and stops with random arrivals as found at isolated…
Expand
1980
1980
Pharmacological characterisation of pre- and postsynaptic α-adrenoceptors in dog saphenous vein
A. Sullivan
,
G. M. Drew
Naunyn-Schmiedeberg's Archives of Pharmacology
1980
Corpus ID: 20515074
Summary1.The pre- and postsynaptic α-adrenoceptors in the dog saphenous vein have been characterised according to their…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE