Volume 4 | Issue 9 | Year 2013 | Article Id. IJMTT-V4I9P1 | DOI : https://doi.org/10.14445/22315373/IJMTT-V4I9P1
P.Vadivelmurugan , K.Alagarsamy, "Securing Server System from Buffer Overflow vulnerability using Vel-Alagar Algorithm," International Journal of Mathematics Trends and Technology (IJMTT), vol. 4, no. 9, pp. 153-157, 2013. Crossref, https://doi.org/10.14445/22315373/IJMTT-V4I9P1
[1]. Mathematical Symbol Table http://xaravve.trentu.ca/mascot/handbook/SEC_symbols.pdf
[2]. peter Silverman and Richard Johnson “A comparison buffer overflow prevention, implementation and weakness”
[3]. P. Vadivel Murugan, and K. Alagarsamy "Buffer Overflow Attack Vulnerability in Stack.", International Journal of Computer Applications 13.5 (2011): 1-2.
[4]. Seema Yadav, Khaleel Ahmad and Jayant Shekhar. “Classification and Prevention Techniques of Buffer Overflow Attacks” Proceedings of the 5th National Conference; INDIACom-2011 Computing For Nation Development, March 10 – 11, 2011
[5]. Tz-Rung Lee1, Kwo-Cheng Chiu1, and Da-Wei Chang A. Hua and S.-L. Chang “A Lightweight Buffer Overflow Protection Mechanism with Failure-Oblivious Capability”, (Eds.): ICA3PP 2009, LNCS 5574, pp. 661–672, 2009. Springer - Verlag Berlin Heidelberg 2009
[6]. Vadivel Murugan.P K.Alagarsamy “Averting Buffer Overflow Attack in Networking OS using – BOAT Controller”, International Journal of Computer Trends and Technology (IJCTT) – volume 4 Issue 7–July 2013
[7]. V.Selvi Dr.R.Umarani, “Comparative Analysis of Ant Colony and Particle Swarm Optimization Techniques” International Journal of Computer Applications (0975 – 8887) Volume 5– No.4, August 2010.