Polyglot (computing) (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Polyglot (computing)" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
2nd place
2nd place
11th place
8th place
69th place
59th place
low place
low place
691st place
581st place
1,185th place
840th place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
4th place
4th place
low place
low place
low place
low place
low place
7,505th place
low place
low place
3,696th place
2,428th place
low place
low place
low place
low place
551st place
406th place

acm.org

dl.acm.org

  • Jonas Magazinius; Billy K. Rios; Andrei Sabelfeld (4 November 2013). "Polyglots". Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13. pp. 753–764. doi:10.1145/2508859.2516685. ISBN 9781450324779. S2CID 16516484. Archived from the original on 5 September 2022. Retrieved 5 September 2022.

ajronline.org

arxiv.org

  • Bridges, Robert A.; Oesch, Sean; Verma, Miki E.; Iannacone, Michael D.; Huffer, Kelly M. T.; Jewell, Brian; Nichols, Jeff A.; Weber, Brian; Beaver, Justin M.; Smith, Jared M.; Scofield, Daniel; Miles, Craig; Plummer, Thomas; Daniell, Mark; Tall, Anne M. (2023). "Beyond the Hype: An Evaluation of Commercially Available Machine-Learning-Based Malware Detectors". Digital Threats: Research and Practice. 4 (2): 1–22. arXiv:2012.09214. doi:10.1145/3567432. S2CID 247218744.
  • Koch, Luke; Oesch, Sean; Adkisson, Mary; Erwin, Sam; Weber, Brian; Chaulagain, Amul (2022). "Toward the Detection of Polyglot Files". arXiv:2203.07561 [cs.CR].
  • Koch, Luke; Oesch, Sean; Chaulagain, Amul; Dixon, Jared; Dixon, Matthew; Huettal, Mike; Sadovnik, Amir; Watson, Cory; Weber, Brian; Hartman, Jacob; Patulski, Richard (2024). "On the Abuse and Detection of Polyglot Files". arXiv:2407.01529 [cs.CR].

canceridc.dev

learn.canceridc.dev

ccc.de

fahrplan.events.ccc.de

  • Wolf, Julia (9 February 2011). "OMG WTF PDF". 27th Chaos Communication Congress. Archived from the original on 9 October 2022. Retrieved 6 September 2022.

doi.org

  • Jonas Magazinius; Billy K. Rios; Andrei Sabelfeld (4 November 2013). "Polyglots". Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13. pp. 753–764. doi:10.1145/2508859.2516685. ISBN 9781450324779. S2CID 16516484. Archived from the original on 5 September 2022. Retrieved 5 September 2022.
  • Bridges, Robert A.; Oesch, Sean; Verma, Miki E.; Iannacone, Michael D.; Huffer, Kelly M. T.; Jewell, Brian; Nichols, Jeff A.; Weber, Brian; Beaver, Justin M.; Smith, Jared M.; Scofield, Daniel; Miles, Craig; Plummer, Thomas; Daniell, Mark; Tall, Anne M. (2023). "Beyond the Hype: An Evaluation of Commercially Available Machine-Learning-Based Malware Detectors". Digital Threats: Research and Practice. 4 (2): 1–22. arXiv:2012.09214. doi:10.1145/3567432. S2CID 247218744.
  • Desjardins, Benoit; Mirsky, Yisroel; Ortiz, Markel Picado; Glozman, Zeev; Tarbox, Lawrence; Horn, Robert; Horii, Steven C. (April 2020). "DICOM Images Have Been Hacked! Now What?". American Journal of Roentgenology. 214 (4): 727–735. doi:10.2214/AJR.19.21958. PMID 31770023. S2CID 208318324. Archived from the original on 5 September 2022. Retrieved 5 September 2022.

hackaday.com

ideology.com.au

infoworld.com

ioccc.org

medium.com

mitre.org

cve.mitre.org

  • "CVE-2008-5343". cve.mitre.org. 4 December 2008. Archived from the original on 20 April 2021. Retrieved 20 April 2021.

nih.gov

pubmed.ncbi.nlm.nih.gov

python-future.org

riosec.com

semanticscholar.org

api.semanticscholar.org

  • Jonas Magazinius; Billy K. Rios; Andrei Sabelfeld (4 November 2013). "Polyglots". Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13. pp. 753–764. doi:10.1145/2508859.2516685. ISBN 9781450324779. S2CID 16516484. Archived from the original on 5 September 2022. Retrieved 5 September 2022.
  • Bridges, Robert A.; Oesch, Sean; Verma, Miki E.; Iannacone, Michael D.; Huffer, Kelly M. T.; Jewell, Brian; Nichols, Jeff A.; Weber, Brian; Beaver, Justin M.; Smith, Jared M.; Scofield, Daniel; Miles, Craig; Plummer, Thomas; Daniell, Mark; Tall, Anne M. (2023). "Beyond the Hype: An Evaluation of Commercially Available Machine-Learning-Based Malware Detectors". Digital Threats: Research and Practice. 4 (2): 1–22. arXiv:2012.09214. doi:10.1145/3567432. S2CID 247218744.
  • Desjardins, Benoit; Mirsky, Yisroel; Ortiz, Markel Picado; Glozman, Zeev; Tarbox, Lawrence; Horn, Robert; Horii, Steven C. (April 2020). "DICOM Images Have Been Hacked! Now What?". American Journal of Roentgenology. 214 (4): 727–735. doi:10.2214/AJR.19.21958. PMID 31770023. S2CID 208318324. Archived from the original on 5 September 2022. Retrieved 5 September 2022.

theuntitledblog.com

threatpost.com

w3.org

w3.org

dev.w3.org

web.archive.org

xmlplease.com

xs-sniper.com