نتایج جستجو برای: reservoir overflow

تعداد نتایج: 48275  

2003
Shuo Chen Zbigniew T. Kalbarczyk Jun Xu Ravishankar K. Iyer

This paper combines an analysis of data on security vulnerabilities (published in Bugtraq database) and a focused source-code examination to develop a finite state machine (FSM) model to depict and reason about security vulnerabilities. An in-depth analysis of the vulnerability reports and the corresponding source code of the applications leads to three observations: (i) exploits must pass thro...

2012
Pankaj B. Pawar Malti Nagle Pankaj K. Kawadkar

Now a day internet threat takes a blended attack form, targeting individual users to gain control over networks and data. Buffer Overflow which is one of the most occurring security vulnerabilities in a Computer’s world. Buffer Overflow occurs while writing data to a buffer and it overruns the buffer's boundary and overwrites it to a adjacent memory. The techniques to exploit buffer overflow vu...

1998
Crispan Cowan

This paper presents a systematic solution to the persistent problem of buffer overflow attacks. Buffer overflow attacks gained notoriety in 1988 as part of the Morris Worm incident on the Internet. While it is fairly simple to fix individual buffer overflow vulnerabilities, buffer overflow attacks continue to this day. Hundreds of attacks have been discovered, and while most of the obvious vuln...

2005
Michael Zhivich Tim Leek Richard Lippmann

The capabilities of seven dynamic buffer overflow detection tools (Chaperon, Valgrind, CCured, CRED, Insure++, ProPolice and TinyCC) are evaluated in this paper. These tools employ different approaches to runtime buffer overflow detection and range from commercial products to opensource gcc-enhancements. A comprehensive testsuite was developed consisting of specifically-designed test cases and ...

Journal: :Frontiers in Earth Science 2023

The Carboniferous volcanic reservoirs in the Shixi area of Junggar Basin are complex and diverse. Identifying characteristics main factors controlling high-quality is key to increasing oil gas reserves production this area. Through core observations, thin section identification, physical property pore structure analyses, combined with data, development modes were analysed. results show that str...

Journal: :Sustainability 2022

Climate change in the watershed above reservoir has a direct impact on quantity of streamflow that enters and management water resources. Developing effective rule curves helps reduce risk future failures resource management. The purpose this study was to analyze influence climate volume entering Ubolratana Reservoir, Thailand during years 2020–2049 with simulations from CIMP5 model under RCP4....

Journal: :Frontiers in Ecology and Evolution 2021

Algal blooms have been reported in some tributary bays since the initial impoundment of Three Gorges Reservoir, which has seriously affected water ecology and drinking safety. Hydrodynamics plays a crucial role algae growth. The recent numerical models hydrodynamics quality are effective to identify effects on phytoplankton find potential strategies for controlling algal blooms. In this study, ...

2009
Jiayan Yang SHINICHIRO KIDA JIAYAN YANG JAMES F. PRICE

Marginal sea overflows and the overlying upper ocean are coupled in the vertical by two distinct mechanisms— by an interfacial mass flux from the upper ocean to the overflow layer that accompanies entrainment and by a divergent eddy flux associated with baroclinic instability. Because both mechanisms tend to be localized in space, the resulting upper ocean circulation can be characterized as a ...

Journal: :The European journal of neuroscience 2011
Tomoyuki Mitsumori Tomoyuki Furuyashiki Toshihiko Momiyama Akinori Nishi Takahide Shuto Takashi Hayakawa Fumitaka Ushikubi Shiho Kitaoka Tomohiro Aoki Haruhisa Inoue Toshiyuki Matsuoka Shuh Narumiya

The extracellular dopamine level is regulated not only by synaptic inputs to dopamine neurons but also by local mechanisms surrounding dopaminergic terminals. However, much remains to be investigated for the latter mechanism. Thromboxane A(2) is one of the cyclooxygenase products derived from arachidonic acid, and acts on its cognate G protein-coupled receptor [thromboxane receptor (TP)]. We sh...

2003
Christof Fetzer Zhen Xiao

HEALERS is a practical, high-performance toolkit that can enhance the robustness and security of existing applications. For any shared library, it can find all functions defined in that library and automatically derives properties for those functions. Through automated faultinjection experiments, it can detect arguments that cause the library to crash and derive safe argument types for each fun...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید