Cited By
View all- Yang GLiu XTang C(2022)Horus: An Effective and Reliable Framework for Code-Reuse Exploits Detection in Data StreamElectronics10.3390/electronics1120336311:20(3363)Online publication date: 18-Oct-2022
- Bronte RShahriar HHaddad H(2016)A Signature-Based Intrusion Detection System for Web Applications based on Genetic AlgorithmProceedings of the 9th International Conference on Security of Information and Networks10.1145/2947626.2951964(32-39)Online publication date: 20-Jul-2016
- Hsu FChen LLin C(2015)Defeat scanning worms in cyber warfareSecurity and Communication Networks10.1002/sec.10198:5(715-726)Online publication date: 25-Mar-2015
- Show More Cited By