Home Mathematics it - Information Technology Volume 59, Issue 2 - Vulnerability Analysis / Guest Editor: Konrad Rieck
it - Information Technology
Issue Open Access

Volume 59, Issue 2 - Vulnerability Analysis / Guest Editor: Konrad Rieck

it - Information Technology
This issue is in the journal

Contents
  • Publicly Available
    Frontmatter
    April 14, 2017
    Page range: i-iv
  • Editorial
  • Requires Authentication Unlicensed
    Licensed
    Vulnerability analysis
    March 20, 2017
    Konrad Rieck
    Page range: 57-58
  • Thematic Issue: Vulnerability Analysis
  • March 15, 2017
    Collin Mulliner, William Robertson, Engin Kirda
    Page range: 59-65
  • Requires Authentication Unlicensed
    Licensed
    E-mail Header Injection Vulnerabilities
    March 15, 2017
    Sai Prashanth Chandramouli, Ziming Zhao, Adam Doupé, Gail-Joon Ahn
    Page range: 67-72
  • Requires Authentication Unlicensed
    Licensed
    64-Bit Migration Vulnerabilities
    February 13, 2017
    Christian Wressnegger, Fabian Yamaguchi, Alwin Maier, Konrad Rieck
    Page range: 73-81
  • March 28, 2017
    Jannik Pewny, Behrad Garmany, Robert Gawlik, Christian Rossow, Thorsten Holz
    Page range: 83-91
  • Requires Authentication Unlicensed
    Licensed
    Exploitation as code reuse: On the need of formalization
    January 17, 2017
    Sergey Bratus, Anna Shubina
    Page range: 93-100
  • Distinguished Dissertations
  • Requires Authentication Unlicensed
    Licensed
    Pattern-based methods for vulnerability discovery
    March 20, 2017
    Fabian Yamaguchi
    Page range: 101-106
Downloaded on 23.10.2025 from https://www.degruyterbrill.com/journal/key/itit/59/2/html
Scroll to top button