I agree that this site is using cookies. You can find further informations
here
.
X
Login
Merkliste (
0
)
Home
About us
Home About us
Our history
Profile
Press & public relations
Friends
The library in figures
Exhibitions
Projects
Training, internships, careers
Films
Services & Information
Home Services & Information
Lending and interlibrary loans
Returns and renewals
Training and library tours
My Account
Library cards
New to the library?
Download Information
Opening hours
Learning spaces
PC, WLAN, copy, scan and print
Catalogs and collections
Home Catalogs and Collections
Rare books and manuscripts
Digital collections
Subject Areas
Our sites
Home Our sites
Central Library
Law Library (Juridicum)
BB Business and Economics (BB11)
BB Physics and Electrical Engineering
TB Engineering and Social Sciences
TB Economics and Nautical Sciences
TB Music
TB Art & Design
TB Bremerhaven
Contact the library
Home Contact the library
Staff Directory
Open access & publishing
Home Open access & publishing
Reference management: Citavi & RefWorks
Publishing documents
Open Access in Bremen
zur Desktop-Version
Toggle navigation
Merkliste
1 Ergebnisse
1
Unveiling the Achilles' Heel: A Comprehensive Exploration o..:
, In:
2024 11th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)
,
Joshi, Atharva Prashant
;
Kaur, Navneet
;
Kaur, Anchita
- p. 1-5 , 2024
Link:
https://doi.org/10.1109/ICRITO61523.2024.10522462
RT T1
2024 11th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)
: T1
Unveiling the Achilles' Heel: A Comprehensive Exploration of Vulnerabilities in RMI and Bindshell Communication
UL https://suche.suub.uni-bremen.de/peid=ieee-10522462&Exemplar=1&LAN=DE A1 Joshi, Atharva Prashant A1 Kaur, Navneet A1 Kaur, Anchita YR 2024 SN 2769-2884 K1 Ethics K1 Market research K1 Control systems K1 Software K1 Reliability K1 Optimization K1 Penetration testing K1 Remote Access K1 System Exploitation K1 File Manipulation K1 Data Extraction K1 Network Management K1 Security Weaknesses K1 Java RMI K1 Bindshell Protocol K1 Security Measures K1 Unauthorized Access K1 Security Breach Mitigation SP 1 OP 5 LK http://dx.doi.org/https://doi.org/10.1109/ICRITO61523.2024.10522462 DO https://doi.org/10.1109/ICRITO61523.2024.10522462 SF ELIB - SuUB Bremen
Export
RefWorks (nur Desktop-Version!)
Flow
(Zuerst in
Flow
einloggen, dann importieren)