咨询与建议

限定检索结果

文献类型

  • 110 篇 会议
  • 88 篇 期刊文献
  • 5 篇 学位论文

馆藏范围

  • 203 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 187 篇 工学
    • 152 篇 计算机科学与技术...
    • 75 篇 软件工程
    • 51 篇 电气工程
    • 25 篇 信息与通信工程
    • 12 篇 控制科学与工程
    • 7 篇 电子科学与技术(可...
    • 5 篇 网络空间安全
    • 4 篇 机械工程
    • 2 篇 材料科学与工程(可...
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 安全科学与工程
  • 13 篇 管理学
    • 12 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 10 篇 理学
    • 8 篇 数学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 军事学

主题

  • 203 篇 control flow gra...
  • 12 篇 static analysis
  • 9 篇 program dependen...
  • 8 篇 deep learning
  • 8 篇 software testing
  • 7 篇 program slicing
  • 7 篇 program analysis
  • 7 篇 data flow analys...
  • 7 篇 abstract syntax ...
  • 7 篇 malware detectio...
  • 6 篇 graph neural net...
  • 6 篇 flow graphs
  • 6 篇 vulnerability de...
  • 6 篇 cfg
  • 6 篇 malware
  • 5 篇 regression testi...
  • 5 篇 reverse engineer...
  • 5 篇 control flow int...
  • 5 篇 cybersecurity
  • 5 篇 symbolic executi...

机构

  • 5 篇 indian inst tech...
  • 3 篇 brno university ...
  • 3 篇 northwestern pol...
  • 2 篇 vnu univ engn & ...
  • 2 篇 zhongguancun lab...
  • 2 篇 sun yat sen univ...
  • 2 篇 sungkyunkwan uni...
  • 2 篇 东南大学
  • 2 篇 kagawa univ fac ...
  • 2 篇 delft univ techn...
  • 2 篇 peking univ key ...
  • 2 篇 beijing inst sys...
  • 2 篇 univ fed juiz de...
  • 2 篇 sun yat sen univ...
  • 2 篇 guangzhou univ s...
  • 2 篇 brandon univ dep...
  • 2 篇 natl inst techno...
  • 2 篇 the university o...
  • 2 篇 harbin engn univ...
  • 2 篇 peking univ sch ...

作者

  • 3 篇 alrasheed hend
  • 3 篇 rosen bk
  • 3 篇 mall r
  • 3 篇 ullah farhan
  • 3 篇 chimalakonda sri...
  • 3 篇 melton austin
  • 2 篇 zadeck fk
  • 2 篇 sofokleous anast...
  • 2 篇 facon adrien
  • 2 篇 ullah shamsher
  • 2 篇 xiaosen wen
  • 2 篇 lee kwangwoo
  • 2 篇 cao yongzhi
  • 2 篇 mund gb
  • 2 篇 gupta r
  • 2 篇 wegman mn
  • 2 篇 lukacs daniel
  • 2 篇 srivastava gauta...
  • 2 篇 wang ke-hui
  • 2 篇 xu baowen

语言

  • 193 篇 英文
  • 6 篇 其他
  • 3 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=Control Flow Graph"
203 条 记 录,以下是11-20 订阅
排序:
A control flow graph Reconstruction Method from Binaries Based on XML
A Control Flow Graph Reconstruction Method from Binaries Bas...
收藏 引用
International Forum on Computer Science-Technology and Applications
作者: Yin Wenjian Jiang Liehui Yin Qing Zhou Lina Li Jizhong Natl Digital Switching Syst Engn & Technol Res Ct Zhengzhou 450002 Henan Province Peoples R China
The first step of decompilation and other reverse analysis for binary codes is constructing control flow graph of program. Due to the loss of structure in compiled code, extracting a control flow graph from an executa... 详细信息
来源: 评论
Malware Detection using Assembly Code and control flow graph Optimization  10
Malware Detection using Assembly Code and Control Flow Graph...
收藏 引用
1st Amrita ACM-W Celebration of Women in Computing in India (A2CWiC)
作者: Anju, S. S. Harmya, P. Jagadeesh, Noopa Darsana, R. Amrita Vishwa Vidyapeetham Ctr Cyber Secur Coimbatore Tamil Nadu India
Malware detection is a crucial aspect of software security. A malware detector is a system that attempts to determine whether a program has malicious intent. Current malware detectors work by checking for signatures, ... 详细信息
来源: 评论
Learning from the Multi-Level Abstraction of the control flow graph via Alternating Propagation for Bug Localization  22
Learning from the Multi-Level Abstraction of the Control Flo...
收藏 引用
22nd IEEE International Conference on Data Mining (ICDM)
作者: Ma, Yi-Fan Li, Ming Nanjing Univ Natl Key Lab Novel Software Technol Nanjing 210023 Peoples R China
Bug localization aims to automatically locate the buggy source files according to the bug report, which plays an important role in software maintenance. Recent studies indicate that exploiting the program structure is... 详细信息
来源: 评论
An Evaluation of Code Coverage Adequacy in Automatic Testing using control flow graph Visualization  10
An Evaluation of Code Coverage Adequacy in Automatic Testing...
收藏 引用
IEEE 10th Symposium on Computer Applications and Industrial Electronics (ISCAIE)
作者: Rahmani, Ani Min, Joe Lian Maspupah, Asri Politekn Negeri Bandung Dept Comp & Informat Engn Bandung Indonesia
There are some issues that frequently experienced by some software industries at the testing stage, that is the coverage test case. This is the extent to which the completeness of the test case in the tested unit prog... 详细信息
来源: 评论
A novel method to find time complexity of an algorithm by using control flow graph  1
A novel method to find time complexity of an algorithm by us...
收藏 引用
1st International Conference on Technical Advancements in Computers and Communications (ICTACC)
作者: Kumar, K. Senthil Malathi, D. SRM Univ Dept Comp Sci & Engn Kattankulathur 603203 India
control flow graph represents the flow of a program by a directed graph. They are used in Software engineering, Compilers and Static program analysis. control flow graph represents various paths a typical program may ... 详细信息
来源: 评论
Mining control flow graph as API Call-grams to Detect Portable Executable Malware  12
Mining Control Flow Graph as <i>API Call</i>-<i>grams</i> to...
收藏 引用
5th International Conference on Security of Information and Networks (SIN)
作者: Faruki, Parvez Laxmi, Vijay Gaur, M. S. Vinod, P. Malaviya Natl Inst Technol Dept Comp Engn Jaipur Rajasthan India Govt Polytech Dept Informat Technol Ahmadabad Gujarat India SCMS Sch Engn Thiruvananthapuram Kerala India
Present day malware shows stealthy and dynamic capability and avails administrative rights to control the victim computers. Malware writers depend on evasion techniques like code obfuscation, packing, compression, enc... 详细信息
来源: 评论
Identifying ATT&CK Tactics in Android Malware control flow graph Through graph Representation Learning and Interpretability
Identifying ATT&CK Tactics in Android Malware Control Flow G...
收藏 引用
9th IEEE International Conference on Big Data (IEEE BigData)
作者: Fairbanks, Jeffrey Orbe, Andres Patterson, Christine Layne, Janet Serra, Edoardo Scheepers, Marion Northwest Nazarene Univ Comp Sci Dept Nampa ID 83686 USA New Jersey Inst Technol Comp Sci Dept Newark NJ 07102 USA Boise State Univ Dept Math Boise ID 83725 USA Boise State Univ Comp Sci Dept Boise ID 83725 USA
To mitigate a malware threat it is important to understand the malware's behavior. The MITRE ATT&ACK ontology specifies an enumeration of tactics, techniques, and procedures (TTP) that characterize malware. Ho... 详细信息
来源: 评论
Triplet-trained graph transformer with control flow graph for few-shot malware classification
收藏 引用
INFORMATION SCIENCES 2023年 第1期649卷
作者: Bu, Seok-Jun Cho, Sung-Bae Yonsei Univ Dept Comp Sci Seoul 03722 South Korea
The exponential proliferation of malware requires robust detection mechanisms for the security of global enterprises and national infrastructures. Conventional malware classification methods primarily depend on extens... 详细信息
来源: 评论
Smart contract vulnerabilities detection with bidirectional encoder representations from transformers and control flow graph
收藏 引用
MULTIMEDIA SYSTEMS 2024年 第4期30卷 204-204页
作者: Su, Peng Hu, Jingyuan Univ Sci & Technol Beijing Sch Comp & Commun Engn Beijing Peoples R China Chinese Acad Sci Inst Informat Engn Beijing Peoples R China
Up to now, the smart contract vulnerabilities detection methods based on sequence modal data and sequence models have been the most commonly used. However, existing state-of-the-art methods disregard the issue of sequ... 详细信息
来源: 评论
ATOS: Adaptive Program Tracing With Online control flow graph Support
收藏 引用
IEEE ACCESS 2019年 7卷 127495-127510页
作者: Sun, He Zhang, Chao Li, He Wu, Zhenhua Wu, Lifa Li, Yun Army Engn Univ PLA Inst Command & Control Engn Nanjing 210007 Jiangsu Peoples R China Tsinghua Univ Inst Network Sci & Cyberspace Beijing 100084 Peoples R China Beijing Natl Res Ctr Informat Sci & Technol Beijing 100084 Peoples R China Informat Engn Univ PLA Strateg Support Force Zhengzhou 450002 Henan Peoples R China Nanjing Univ Posts & Telecommun Sch Comp Sci Nanjing 210003 Jiangsu Peoples R China
Program tracing solutions (i.e., tracers) can faithfully record runtime information about a program's execution and enable flexible and powerful offline analysis. Therefore, they have become fundamental techniques... 详细信息
来源: 评论