共 50 条
- [31] A Relational Approach to Evil Action: Vulnerability and its Exploitation JOURNAL OF VALUE INQUIRY, 2019, 53 (01): : 33 - 53
- [32] Using Software Structure to Predict Vulnerability Exploitation Potential 2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 13 - 18
- [33] Heap Vulnerability Exploitation Techniques on the Linux Platform: An Overview 2024 9TH INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING, ICSIP, 2024, : 371 - 382
- [35] Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (05): : 955 - 966
- [36] Risk Assessment by Dynamic Representation of Vulnerability, Exploitation, and Impact CYBER SENSING 2015, 2015, 9458
- [37] Critical vulnerability analysis and exploitation based on exception capture Ruan Jian Xue Bao/Journal of Software, 2010, 21 (11): : 2944 - 2958
- [40] Automated Vulnerability Exploitation Using Deep Reinforcement Learning APPLIED SCIENCES-BASEL, 2024, 14 (20):