咨询与建议

限定检索结果

文献类型

  • 111 篇 会议
  • 87 篇 期刊文献
  • 5 篇 学位论文

馆藏范围

  • 203 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 187 篇 工学
    • 152 篇 计算机科学与技术...
    • 74 篇 软件工程
    • 51 篇 电气工程
    • 26 篇 信息与通信工程
    • 12 篇 控制科学与工程
    • 7 篇 电子科学与技术(可...
    • 5 篇 网络空间安全
    • 4 篇 机械工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 生物医学工程(可授...
  • 14 篇 管理学
    • 13 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
    • 1 篇 工商管理
  • 11 篇 理学
    • 9 篇 数学
    • 2 篇 统计学(可授理学、...
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
    • 1 篇 系统科学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 军事学

主题

  • 203 篇 control flow gra...
  • 12 篇 static analysis
  • 9 篇 program dependen...
  • 8 篇 deep learning
  • 8 篇 abstract syntax ...
  • 8 篇 software testing
  • 7 篇 program slicing
  • 7 篇 program analysis
  • 7 篇 data flow analys...
  • 7 篇 malware detectio...
  • 6 篇 graph neural net...
  • 6 篇 flow graphs
  • 6 篇 vulnerability de...
  • 6 篇 cfg
  • 6 篇 malware
  • 5 篇 regression testi...
  • 5 篇 reverse engineer...
  • 5 篇 control flow int...
  • 5 篇 cybersecurity
  • 5 篇 symbolic executi...

机构

  • 5 篇 indian inst tech...
  • 3 篇 brno university ...
  • 3 篇 northwestern pol...
  • 2 篇 vnu univ engn & ...
  • 2 篇 zhongguancun lab...
  • 2 篇 sun yat sen univ...
  • 2 篇 sungkyunkwan uni...
  • 2 篇 东南大学
  • 2 篇 kagawa univ fac ...
  • 2 篇 delft univ techn...
  • 2 篇 peking univ key ...
  • 2 篇 beijing inst sys...
  • 2 篇 univ fed juiz de...
  • 2 篇 sun yat sen univ...
  • 2 篇 guangzhou univ s...
  • 2 篇 brandon univ dep...
  • 2 篇 natl inst techno...
  • 2 篇 the university o...
  • 2 篇 harbin engn univ...
  • 2 篇 peking univ sch ...

作者

  • 3 篇 alrasheed hend
  • 3 篇 rosen bk
  • 3 篇 mall r
  • 3 篇 ullah farhan
  • 3 篇 chimalakonda sri...
  • 3 篇 melton austin
  • 2 篇 zadeck fk
  • 2 篇 sofokleous anast...
  • 2 篇 facon adrien
  • 2 篇 ullah shamsher
  • 2 篇 xiaosen wen
  • 2 篇 lee kwangwoo
  • 2 篇 cao yongzhi
  • 2 篇 mund gb
  • 2 篇 gupta r
  • 2 篇 wegman mn
  • 2 篇 lukacs daniel
  • 2 篇 srivastava gauta...
  • 2 篇 wang ke-hui
  • 2 篇 xu baowen

语言

  • 192 篇 英文
  • 7 篇 其他
  • 3 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=Control Flow Graph"
203 条 记 录,以下是111-120 订阅
排序:
A Directed Fuzzing Based on the Dynamic Symbolic Execution and Extended Program Behavior Model
A Directed Fuzzing Based on the Dynamic Symbolic Execution a...
收藏 引用
2nd International Conference on Instrumentation and Measurement, Computer, Communication and control (IMCCC)
作者: Chen, Zhe Guo, Shize Fu, Damao North Elect Equipments Res Inst Beijing Peoples R China
This paper presents a new automated directed fuzzing technique. First, the behavior information is extracted from the original complex control flow graph (CFG) by using the dynamic symbolic execution. Then, the case t... 详细信息
来源: 评论
Detection and analysis of iterative behavior in parallel applications
收藏 引用
8th International Conference on Computational Science
作者: Fuerlinger, Karl Moore, Shirley Univ Tennessee Dept Elect Engn & Comp Sci Knoxville TN 37996 USA
Many applications exhibit iterative and phase based behavior. We present an approach to detect and analyze iteration phases in applications by recording the control flow graph of the application and analyzing it for l... 详细信息
来源: 评论
Automatic Identification of Use Cases from Codes: A User’s Goal Driven Approach
收藏 引用
Wuhan University Journal of Natural Sciences 2009年 第5期14卷 409-414页
作者: ZHOU Xiaoyu QIAN Ju CHEN Lin XU Baowen School of Computer Science and Engineering Southeast University Nanjing 211189 Jiangsu China College of Information Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing 210016 Jiangsu China Department of Computer Science and Technology Nanjing University Nanjing 210093 Jiangsu China
Based on the different roles played by base flow and alternative flow in the process to achieve user's goals, we have found that loop structure is frequently used to implement alternative flow and/or to connect diffe... 详细信息
来源: 评论
Optimal Test Sequence Generation using River Formation Dynamics  5
Optimal Test Sequence Generation using River Formation Dynam...
收藏 引用
5th International Conference System Modeling and Advancement in Research Trends (SMART)
作者: khatri, Yogita Sharma, Abhilasha Kumar, Akshi Delhi Technol Univ CSE Dept New Delhi India
Software testing is a complex and exhaustive process, often limited by the resources. Although many approaches for test sequence generation exist in the literature, but none of it is ideal as far as coverage and redun... 详细信息
来源: 评论
Advanced Malware Variant Detection Algorithm Using Structural Characteristic of Executable File
Advanced Malware Variant Detection Algorithm Using Structura...
收藏 引用
3rd International Conference on Future Generation Information Technology
作者: Shin, Donghwi Lee, Kwangwoo Won, Dongho Sungkyunkwan Univ Sch Informat & Commun Engn Informat Secur Grp Suwon 440746 Gyeonggi Do South Korea
The malware is not the strange word. As much again the threat and number of malware is raising. However we and vendors do not arrange these malwares. They store these malware. The reason is the number is so many and t... 详细信息
来源: 评论
PHP Vulnerability Detection Based on Taint Analysis  6
PHP Vulnerability Detection Based on Taint Analysis
收藏 引用
6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)
作者: Cao, Kai He, Jing Fan, Wenqing Huang, Wei Chen, Lei Pan, Yue Commun Univ China Fac Sci & Technol Beijing Peoples R China
To detect the vulnerabilities of Web applications which based on the PHP scripting language. This paper proposes a PHP vulnerability detection method based on fine-grained taint analysis algorithm. First of all, this ... 详细信息
来源: 评论
Path Executions of Java Bytecode Programs
Path Executions of Java Bytecode Programs
收藏 引用
International Conference on Advanced Computing and Intelligent Engineering (ICACIE)
作者: Soomro, Safeeullah Alansari, Zainab Belgaum, Mohammad Riyaz AMA Int Univ Coll Comp Studies Salmabad Bahrain Univ Malaya Kuala Lumpur Malaysia
Static analysis of programs is essential for better understanding towards software maintenance and re-engineering. Unfortunately, we still lack automatic tools to understand the back end of the programs (Bytecode). De... 详细信息
来源: 评论
COBREX: A Tool for Extracting Business Rules from COBOL  39
COBREX: A Tool for Extracting Business Rules from COBOL
收藏 引用
39th IEEE International Conference on Software Maintenance and Evolution (ICSME)
作者: Ali, Mir Sameed Manjunath, Nikhil Chimalakonda, Sridhar Indian Inst Technol Tirupati Dept Comp Sci & Engn Res Intelligent Software & Human Analyt RISHA Lab Tirupati Andhra Pradesh India
COBOL (Common Business-Oriented Language) has had a strong presence for the last five decades and is still prevalent in the finance and banking sectors and other organizations. The systems which were earlier written i... 详细信息
来源: 评论
Scope of Selection Nodes in Object Oriented Programs  40
Scope of Selection Nodes in Object Oriented Programs
收藏 引用
40th Annual IEEE Computer Software and Applications Conference Symposium (COMPSAC) / Symposium on Software Engineering Technology and Applications (SETA)
作者: Alrasheed, Hend Melton, Austin Kent State Univ Dept Comp Sci Kent OH 44242 USA
Many complexity measures have been introduced to capture different aspects of code complexity. A factor that (in most cases) increases the difficulty of code is the excessive use of nesting constructs. In this work, w... 详细信息
来源: 评论
Profitability computations on program flow graphs
收藏 引用
Computers and Mathematics with Applications 1976年 第2期2卷 145-159页
作者: Cocke, John Kennedy, Ken IBM Thomas J. Watson Research Center Yorktown Heights NY 10598 United States Department of Mathematical Sciences Rice University Houston TX 77001 United States
The "profitability" of code optimizations is defined in terms of a Markov model of program flow. A system of linear equations for the expected frequency of execution of blocks of a program is derived. A solu... 详细信息
来源: 评论