| Document Date: 2011-11-09 13:26:00 Open Document File Size: 227,28 KBShare Result on Facebook
Company CONCLUSIONS In / Reliable Distributed Systems / Syngress Publishing / S. Jha S. A. / Intel / Microsoft / / Country United States / Singapore / / Currency USD / / / Facility Library Bitstring Heap Overflow / Computer Science Department North Carolina State University / / IndustryTerm detection systems / high processing / software flaws / traffic capture tool / modest additional processing / data mining methods / Internet infrastructure / software exploits / neural networks / vulnerable computer systems / data-mining / software makes / derived chain / neural network / above tools / ftp server / Internet worms / disassembly technology / detection algorithm / vulnerable systems / modest processing speed / / OperatingSystem XP / Windows XP / Microsoft Windows / / Organization National Science Foundation / U.S. Securities and Exchange Commission / North Carolina State University / Raleigh / / Person Morgan Kaufmann / Douglas S. Reeves / / / Position General / / Product Windows XP / / ProgrammingLanguage C / / Technology code encryption / RAM / disassembly technology / streaming video / application protocol / UDP / SSL / exploit code encryption / encryption / neural network / HTTP / data mining / detection algorithm / / URL http /
SocialTag |