BARBU, I.D. (2013). Buffer Overflow Vulnerability Exploitation Using Open-Source Tools. International Journal of Information Security and Cybercrime, 2(2), 43-54. Retrieve from https://www.ijisc.comBARBU, I.D., 2013. Buffer Overflow Vulnerability Exploitation Using Open-Source Tools. International Journal of Information Security and Cybercrime 2(2), 43-54. Available from: https://www.ijisc.comI.D. BARBU, "Buffer Overflow Vulnerability Exploitation Using Open-Source Tools," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 43-54, 2013. Available: https://www.ijisc.comBARBU, I.D., 'Buffer Overflow Vulnerability Exploitation Using Open-Source Tools', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 43-54, (2013).BARBU, I.D.: Buffer Overflow Vulnerability Exploitation Using Open-Source Tools. International Journal of Information Security and Cybercrime 2 (2013) 43-54. https://www.ijisc.comBARBU, I.D., (2013), Buffer Overflow Vulnerability Exploitation Using Open-Source Tools. International Journal of Information Security and Cybercrime, 2: 43-54. https://www.ijisc.com Citation Format :