咨询与建议

限定检索结果

文献类型

  • 110 篇 会议
  • 87 篇 期刊文献
  • 5 篇 学位论文

馆藏范围

  • 202 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 186 篇 工学
    • 151 篇 计算机科学与技术...
    • 74 篇 软件工程
    • 51 篇 电气工程
    • 25 篇 信息与通信工程
    • 11 篇 控制科学与工程
    • 7 篇 电子科学与技术(可...
    • 5 篇 网络空间安全
    • 4 篇 机械工程
    • 2 篇 材料科学与工程(可...
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 安全科学与工程
  • 13 篇 管理学
    • 12 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 10 篇 理学
    • 8 篇 数学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 军事学

主题

  • 202 篇 control flow gra...
  • 11 篇 static analysis
  • 9 篇 program dependen...
  • 8 篇 deep learning
  • 8 篇 software testing
  • 7 篇 program slicing
  • 7 篇 program analysis
  • 7 篇 data flow analys...
  • 7 篇 abstract syntax ...
  • 7 篇 malware detectio...
  • 6 篇 graph neural net...
  • 6 篇 flow graphs
  • 6 篇 vulnerability de...
  • 6 篇 cfg
  • 6 篇 malware
  • 5 篇 regression testi...
  • 5 篇 reverse engineer...
  • 5 篇 control flow int...
  • 5 篇 cybersecurity
  • 5 篇 symbolic executi...

机构

  • 5 篇 indian inst tech...
  • 3 篇 brno university ...
  • 3 篇 northwestern pol...
  • 2 篇 vnu univ engn & ...
  • 2 篇 zhongguancun lab...
  • 2 篇 sun yat sen univ...
  • 2 篇 sungkyunkwan uni...
  • 2 篇 东南大学
  • 2 篇 kagawa univ fac ...
  • 2 篇 delft univ techn...
  • 2 篇 peking univ key ...
  • 2 篇 beijing inst sys...
  • 2 篇 univ fed juiz de...
  • 2 篇 sun yat sen univ...
  • 2 篇 guangzhou univ s...
  • 2 篇 brandon univ dep...
  • 2 篇 natl inst techno...
  • 2 篇 the university o...
  • 2 篇 harbin engn univ...
  • 2 篇 peking univ sch ...

作者

  • 3 篇 alrasheed hend
  • 3 篇 rosen bk
  • 3 篇 mall r
  • 3 篇 ullah farhan
  • 3 篇 chimalakonda sri...
  • 3 篇 melton austin
  • 2 篇 zadeck fk
  • 2 篇 sofokleous anast...
  • 2 篇 facon adrien
  • 2 篇 ullah shamsher
  • 2 篇 xiaosen wen
  • 2 篇 lee kwangwoo
  • 2 篇 cao yongzhi
  • 2 篇 mund gb
  • 2 篇 gupta r
  • 2 篇 wegman mn
  • 2 篇 lukacs daniel
  • 2 篇 srivastava gauta...
  • 2 篇 wang ke-hui
  • 2 篇 xu baowen

语言

  • 192 篇 英文
  • 6 篇 其他
  • 3 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=Control Flow Graph"
202 条 记 录,以下是1-10 订阅
排序:
control flow graph Based Multiclass Malware Detection Using Bi-normal Separation
收藏 引用
DEFENCE SCIENCE JOURNAL 2016年 第2期66卷 138-145页
作者: Kapoor, Akshay Dhavale, Sunita Def Inst Adv Technol Dept Comp Engn Girinagar 411025 India
control flow graphs (CFG) and OpCodes extracted from disassembled executable files are widely used for malware detection. Most of the research in static analysis is focused on binary class malware detection which only... 详细信息
来源: 评论
control flow graph Matching for Detecting Obfuscated Programs  50th
Control Flow Graph Matching for Detecting Obfuscated Program...
收藏 引用
50th Annual Convention of the Computer-Society-of-India (CSI) on Digital Life
作者: Behera, Chandan Kumar Sanjog, Genius Bhaskari, D. Lalitha Andhra Univ Dept Comp Sci & Syst Engn Visakhapatnam Andhra Pradesh India
Malicious programs like the viruses, worms, Trojan horses, and backdoors infect host computers by taking advantage of flaws of the software and thereby introducing some kind of secret functionalities. The authors of t... 详细信息
来源: 评论
Performance analysis of automatic lookahead generation by control flow graph: some experiments
收藏 引用
SIMULATION PRACTICE AND THEORY 2001年 第8期8卷 511-527页
作者: Zarei, B Pidd, M Univ Lancaster Dept Management Sci Lancaster LA1 4YW England
The performance of parallel discrete event models is highly dependent on lookahead, particularly when a conservative algorithm is employed. Unfortunately lookahead is known to be problem-dependent, which restricts the... 详细信息
来源: 评论
Turna: a control flow graph reconstruction tool for RISC-V architecture
收藏 引用
COMPUTING 2023年 第8期105卷 1821-1845页
作者: Sahin, Veysel Harun Sakarya Univ Dept Software Engn TR-54050 Serdivan Sakarya Turkiye
A control flow graph (CFG) is a type of directed graph that shows the execution paths of the programs. It is a mathematical structure that is actively used in software testing. It can be constructed from the source or... 详细信息
来源: 评论
The flowing nature matters: feature learning from the control flow graph of source code for bug localization
收藏 引用
MACHINE LEARNING 2022年 第3期111卷 853-870页
作者: Ma, Yi-Fan Li, Ming Nanjing Univ Nanjing Peoples R China
Bug localization plays an important role in software maintenance. Traditional works treat the source code from the lexical perspective, while some recent researches indicate that exploiting the program structure is be... 详细信息
来源: 评论
Over-Approximated control flow graph Construction on Pure Esterel
收藏 引用
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS 2010年 第5期E93D卷 985-993页
作者: Kim, Chul-Joo Yun, Jeong-Han Kim, Seonggun Choe, Kwang-Moo Han, Taisook Korea Adv Inst Sci & Technol Div Comp Sci Taejon 305701 South Korea
Esterel is an imperative synchronous language for control-dominant reactive systems. Regardless of imperative features of Esterel, combination of parallel execution and preemption makes it difficult to build control f... 详细信息
来源: 评论
Integrating Path Testing with Software Reliability Estimation Using control flow graph
Integrating Path Testing with Software Reliability Estimatio...
收藏 引用
IEEE International Conference on Management of Innovation and Technology
作者: Hsu, Chao-Jung Huang, Chin-Yu Natl Tsing Hua Univ Dept Comp Sci Hsinchu 30043 Taiwan
In this paper, we propose a new approach to calculate a path's reliability along three basic programming structures, which include sequential, branching, and looping structures. The path's reliability is then ... 详细信息
来源: 评论
Generating control flow graph from Java Card Byte Code  3
Generating Control Flow Graph from Java Card Byte Code
收藏 引用
3rd IEEE International Colloquium on Information Science and Technology (CIST)
作者: Amine, Achkar Mohammed, Benattou Jean-Louis, Lanet Ibn Tofail Univ Kenitra Morocco Univ Limoges Lab XLIM Secure Smart Devices F-87065 Limoges France
The verification process in industrial context of embedded software in smart card is considered difficult, extremely time-consuming, and costly, with very few tools and techniques available to aid in the verification ... 详细信息
来源: 评论
Survey of Malware Analysis through control flow graph using Machine Learning  22
Survey of Malware Analysis through Control Flow Graph using ...
收藏 引用
IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) / BigDataSE Conference / CSE Conference / EUC Conference / ISCI Conference
作者: Mitra, Shaswata Torri, Stephen A. Mittal, Sudip Mississippi State Univ Dept Comp Sci & Engn Mississippi State MS 39762 USA
Malware is a significant threat to the security of computer systems and networks, requiring sophisticated techniques to analyze its behavior and functionality for detection. Due to their rapid evolution, traditional s... 详细信息
来源: 评论
Malware Variant Detection and Classification Using control flow graph
Malware Variant Detection and Classification Using Control F...
收藏 引用
5th International Conference on Convergence and Hybrid Information Technology (ICHIT)
作者: Shin, Donghwi Lee, Kwangwoo Won, Dongho Sungkyunkwan Univ Sch Informat & Commun Engn Informat Secur Grp Suwon 440746 Gyeonggi Do South Korea
The number of malware increases steadily and is too many. So a malware analyst cannot analyze these manually. Therefore many researchers are working on automatic malware analysis. As a result of these researches, ther... 详细信息
来源: 评论