咨询与建议

限定检索结果

文献类型

  • 110 篇 会议
  • 88 篇 期刊文献
  • 5 篇 学位论文

馆藏范围

  • 203 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 187 篇 工学
    • 152 篇 计算机科学与技术...
    • 75 篇 软件工程
    • 51 篇 电气工程
    • 25 篇 信息与通信工程
    • 12 篇 控制科学与工程
    • 7 篇 电子科学与技术(可...
    • 5 篇 网络空间安全
    • 4 篇 机械工程
    • 2 篇 材料科学与工程(可...
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 安全科学与工程
  • 13 篇 管理学
    • 12 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 10 篇 理学
    • 8 篇 数学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 军事学

主题

  • 203 篇 control flow gra...
  • 12 篇 static analysis
  • 9 篇 program dependen...
  • 8 篇 deep learning
  • 8 篇 software testing
  • 7 篇 program slicing
  • 7 篇 program analysis
  • 7 篇 data flow analys...
  • 7 篇 abstract syntax ...
  • 7 篇 malware detectio...
  • 6 篇 graph neural net...
  • 6 篇 flow graphs
  • 6 篇 vulnerability de...
  • 6 篇 cfg
  • 6 篇 malware
  • 5 篇 regression testi...
  • 5 篇 reverse engineer...
  • 5 篇 control flow int...
  • 5 篇 cybersecurity
  • 5 篇 symbolic executi...

机构

  • 5 篇 indian inst tech...
  • 3 篇 brno university ...
  • 3 篇 northwestern pol...
  • 2 篇 vnu univ engn & ...
  • 2 篇 zhongguancun lab...
  • 2 篇 sun yat sen univ...
  • 2 篇 sungkyunkwan uni...
  • 2 篇 东南大学
  • 2 篇 kagawa univ fac ...
  • 2 篇 delft univ techn...
  • 2 篇 peking univ key ...
  • 2 篇 beijing inst sys...
  • 2 篇 univ fed juiz de...
  • 2 篇 sun yat sen univ...
  • 2 篇 guangzhou univ s...
  • 2 篇 brandon univ dep...
  • 2 篇 natl inst techno...
  • 2 篇 the university o...
  • 2 篇 harbin engn univ...
  • 2 篇 peking univ sch ...

作者

  • 3 篇 alrasheed hend
  • 3 篇 rosen bk
  • 3 篇 mall r
  • 3 篇 ullah farhan
  • 3 篇 chimalakonda sri...
  • 3 篇 melton austin
  • 2 篇 zadeck fk
  • 2 篇 sofokleous anast...
  • 2 篇 facon adrien
  • 2 篇 ullah shamsher
  • 2 篇 xiaosen wen
  • 2 篇 lee kwangwoo
  • 2 篇 cao yongzhi
  • 2 篇 mund gb
  • 2 篇 gupta r
  • 2 篇 wegman mn
  • 2 篇 lukacs daniel
  • 2 篇 srivastava gauta...
  • 2 篇 wang ke-hui
  • 2 篇 xu baowen

语言

  • 193 篇 英文
  • 6 篇 其他
  • 3 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=Control Flow Graph"
203 条 记 录,以下是141-150 订阅
排序:
A Predictive Runtime Verification Framework for Cyber-Physical Systems  8
A Predictive Runtime Verification Framework for Cyber-Physic...
收藏 引用
8th IEEE International Conference on Software Security and Reliability-Companion (SERE-C)
作者: Yu, Kang Chen, Zhenbang Dong, Wei Natl Univ Def Technol Sch Comp Changsha Hunan Peoples R China
Runtime verification with a predictive semantics defines how to monitor a temporal property in a predictive manner. In this paper, we propose a predictive runtime verification framework for Cyber-Physical Systems (CPS... 详细信息
来源: 评论
graphRTL: an Agile Design Framework of RTL Code from Data flow graphs
GraphRTL: an Agile Design Framework of RTL Code from Data Fl...
收藏 引用
2nd International Symposium of Electronics Design Automation (ISEDA)
作者: Qiao, Yuheng Xie, Cai Ou, Zhaoting Lei, Peizhi Tian, Yan Chen, Jienan Univ Elect Sci & Technol China Chengdu 611731 Peoples R China
As the increasing demand for large and complex signal processing requirements, the efficient and fast design of signal processing circuits becomes an important issues. Agile design offers a new approach for rapid hard... 详细信息
来源: 评论
C500-CFG: A Novel Algorithm to Extract control flow-based Features for IoT Malware Detection  19
C500-CFG: A Novel Algorithm to Extract Control Flow-based Fe...
收藏 引用
19th International Symposium on Communications and Information Technologies (ISCIT)
作者: Tran Nghi Phu Le Hoang Nguyen Ngoc Toan Nguyen Dai Tho Nguyen Ngoc Binh VNU Univ Engn & Technol Hanoi Vietnam Peoples Secur Acad PSA Hanoi Vietnam
Static characteristic extraction method control flow-based features proposed by Ding has the ability to detect malicious code with higher accuracy than traditional Text-based methods. However, this method resolved NP-... 详细信息
来源: 评论
Algorithm Classification Using Worst-Case Execution Time
Algorithm Classification Using Worst-Case Execution Time
收藏 引用
2nd IEEE International Conference on Computer Science and Information Technology
作者: Mehrotra, Mudit Goel, Ankur Agarwal, Nipun Bindu, M. Hima Sharma, Bhudev Jaypee Inst Informat Technol Univ Dept Comp Sci & Engn Noida India
Problems in computer science require some time to produce an output. Some can be executed in few seconds or minutes. Others require hours, days or even centuries to produce an output. In this paper, we propose a techn... 详细信息
来源: 评论
RELIABILITY ANALYSIS OF TEST CASES FOR PROGRAM SLICING  1
RELIABILITY ANALYSIS OF TEST CASES FOR PROGRAM SLICING
收藏 引用
1st International Conference on Innovation and Challenges in Cyber Security (ICICCS)
作者: Negi, Gaurav Elias, Eldo Kohli, Rashi Bibhu, Vimal Dr APJ AKTU CSE Dept Lucknow Uttar Pradesh India Amity Univ CSE Dept Greater Noida India
The concept used in the research paper includes program slicing which is referred as the process of computing the chosen set of instructions of the program, The slicing criterion refers to the slice that is likely to ... 详细信息
来源: 评论
JSAC: A Novel Framework to Detect Malicious JavaScript via CNNs over AST and CFG
JSAC: A Novel Framework to Detect Malicious JavaScript via C...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Jiang, Hongliang Yang, Yuxing Sun, Lu Jiang, Lin Beijing Univ Posts & Telecommun Scool Comp Sci Beijing Peoples R China
JavaScript (JS) is a dominant programming language in web/mobile development, while it is also notoriously abused by attackers due to its powerful characteristics, e.g., dynamic, prototype-based and multi-paradigm, wh... 详细信息
来源: 评论
Improving Mobile User Interface Testing with Model Driven Monkey Search  14
Improving Mobile User Interface Testing with Model Driven Mo...
收藏 引用
14th IEEE Conference on Software Testing, Verification and Validation (ICST)
作者: Doyle, Jordan Saber, Takfarinas Arcaini, Paolo Ventresque, Anthony Univ Coll Dublin Sch Comp Sci Lero UCD Dublin Ireland Natl Inst Informat Tokyo Japan
Testing mobile applications often relies on tools, such as Exerciser Monkey for Android systems, that simulate user input. Exerciser Monkey, for example, generates random events (e.g., touches, gestures, navigational ... 详细信息
来源: 评论
Regression Test Selection for Android Applications
Regression Test Selection for Android Applications
收藏 引用
IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)
作者: Do, Quan Yang, Guowei Che, Meiru Hui, Darren Ridgeway, Jefferson Texas State Univ Dept Comp Sci San Marcos TX 78666 USA Univ Texas Austin Dept Elect & Comp Engn Austin TX 78712 USA Elizabeth City State Univ Elizabeth City NC 27909 USA
Mobile platform pervades human life, and much research in recent years has focused on improving the reliability of mobile applications on this platform, for example by applying automatic testing. However, researchers ... 详细信息
来源: 评论
A case against indirect jumps for secure programs  19
A case against indirect jumps for secure programs
收藏 引用
9th Software Security, Protection, and Reverse Engineering Workshop (SSPREW)
作者: Gonzalvez, Alexandre Lashermes, Ronan IMT Atlantique INRIA TAMIS Nantes France INRIA SED&LHS Rennes France
A desired property of secure programs is control flowintegrity (CFI): an attacker must not be able to alter how instructions are chained as specified in the program. Numerous techniques try to achieve this property wi... 详细信息
来源: 评论
Exploiting Sub-graph Isomorphism and Probabilistic Neural Networks for the Detection of Hardware Trojans at RTL  19
Exploiting Sub-Graph Isomorphism and Probabilistic Neural Ne...
收藏 引用
19th IEEE International High Level Design Validation and Test Workshop (HLDVT)
作者: Demrozi, Florenc Zucchelli, Riccardo Pravadelli, Graziano Univ Verona Dept Comp Sci Verona Italy
Hardware Trojans (HTs) have been generally inserted at the lower levels of the digital system design and fabrication process, where, due to the high complexity of the hardware model, their detection is more difficult.... 详细信息
来源: 评论