{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:33:32Z","timestamp":1730306012727,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/wocn.2013.6616181","type":"proceedings-article","created":{"date-parts":[[2013,10,10]],"date-time":"2013-10-10T19:29:59Z","timestamp":1381433399000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Analysis of signature and signature free bufferoverflow detection for gif and jpg format"],"prefix":"10.1109","author":[{"given":"Pankaj B.","family":"Pawar","sequence":"first","affiliation":[]},{"given":"Pankaj K.","family":"Kawadkar","sequence":"additional","affiliation":[]},{"given":"Malti","family":"Nagle","sequence":"additional","affiliation":[]},{"given":"Padmashree Kunthe","family":"Ambare","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","article-title":"Attack of buffer-overflow attack blocker using IDS","author":"pawar","year":"2012","journal-title":"International Conference on Electrical Electronics and Computer Science(ICEECS-2012)"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"},{"key":"12","article-title":"Prevention of buffer overflow attack blocker using IDS","volume":"1","author":"pawar","year":"2012","journal-title":"IJCSNS"},{"journal-title":"Testing C Programs for Buffer Overflow Vulnerabilities","year":"0","author":"haugh","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.30"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948147"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/52.976940"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1096000.1096004"},{"key":"6","article-title":"Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software","author":"newsome","year":"2005","journal-title":"Proc 12th Ann Network and Distributed System Security Symp (NDSS)"},{"key":"5","article-title":"A scalable distributed IDS architecture for high speed networks","volume":"9","author":"sallay","year":"2009","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2000.821514"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.36"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095824"}],"event":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks - (WOCN)","start":{"date-parts":[[2013,7,26]]},"location":"Bhopal, India","end":{"date-parts":[[2013,7,28]]}},"container-title":["2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6589213\/6616171\/06616181.pdf?arnumber=6616181","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T13:33:51Z","timestamp":1490189631000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6616181\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/wocn.2013.6616181","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}