The global energy transition is placing unprecedented demands on transmission and distribution networks. As renewable ...
Abstract: Use-After-Free (UAF) vulnerability is one of the common vulnerabilities in multi-threaded programs. Its static detection methods based on value flow analysis commonly show good analysis ...
Abstract: The rapid rise of botnet attacks has disrupted telecom network services for millions of users. Detecting botnet traffic is therefore important for maintaining the availability and quality of ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results