咨询与建议

限定检索结果

文献类型

  • 110 篇 会议
  • 87 篇 期刊文献
  • 5 篇 学位论文

馆藏范围

  • 202 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 186 篇 工学
    • 151 篇 计算机科学与技术...
    • 74 篇 软件工程
    • 51 篇 电气工程
    • 25 篇 信息与通信工程
    • 11 篇 控制科学与工程
    • 7 篇 电子科学与技术(可...
    • 5 篇 网络空间安全
    • 4 篇 机械工程
    • 2 篇 材料科学与工程(可...
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 安全科学与工程
  • 13 篇 管理学
    • 12 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 10 篇 理学
    • 8 篇 数学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 军事学

主题

  • 202 篇 control flow gra...
  • 11 篇 static analysis
  • 9 篇 program dependen...
  • 8 篇 deep learning
  • 8 篇 software testing
  • 7 篇 program slicing
  • 7 篇 program analysis
  • 7 篇 data flow analys...
  • 7 篇 abstract syntax ...
  • 7 篇 malware detectio...
  • 6 篇 graph neural net...
  • 6 篇 flow graphs
  • 6 篇 vulnerability de...
  • 6 篇 cfg
  • 6 篇 malware
  • 5 篇 regression testi...
  • 5 篇 reverse engineer...
  • 5 篇 control flow int...
  • 5 篇 cybersecurity
  • 5 篇 symbolic executi...

机构

  • 5 篇 indian inst tech...
  • 3 篇 brno university ...
  • 3 篇 northwestern pol...
  • 2 篇 vnu univ engn & ...
  • 2 篇 zhongguancun lab...
  • 2 篇 sun yat sen univ...
  • 2 篇 sungkyunkwan uni...
  • 2 篇 东南大学
  • 2 篇 kagawa univ fac ...
  • 2 篇 delft univ techn...
  • 2 篇 peking univ key ...
  • 2 篇 beijing inst sys...
  • 2 篇 univ fed juiz de...
  • 2 篇 sun yat sen univ...
  • 2 篇 guangzhou univ s...
  • 2 篇 brandon univ dep...
  • 2 篇 natl inst techno...
  • 2 篇 the university o...
  • 2 篇 harbin engn univ...
  • 2 篇 peking univ sch ...

作者

  • 3 篇 alrasheed hend
  • 3 篇 rosen bk
  • 3 篇 mall r
  • 3 篇 ullah farhan
  • 3 篇 chimalakonda sri...
  • 3 篇 melton austin
  • 2 篇 zadeck fk
  • 2 篇 sofokleous anast...
  • 2 篇 facon adrien
  • 2 篇 ullah shamsher
  • 2 篇 xiaosen wen
  • 2 篇 lee kwangwoo
  • 2 篇 cao yongzhi
  • 2 篇 mund gb
  • 2 篇 gupta r
  • 2 篇 wegman mn
  • 2 篇 lukacs daniel
  • 2 篇 srivastava gauta...
  • 2 篇 wang ke-hui
  • 2 篇 xu baowen

语言

  • 192 篇 英文
  • 6 篇 其他
  • 3 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=Control Flow Graph"
202 条 记 录,以下是21-30 订阅
排序:
Flexible control flow graph alignment for delivering data-driven feedback to novice programming learner
收藏 引用
JOURNAL OF SYSTEMS AND SOFTWARE 2024年 210卷
作者: Chowdhury, Md Towhidul Absar Contractor, Maheen Riaz Rivero, Carlos R. Rochester Inst Technol One Lomb Mem Dr Rochester NY 14623 USA
Supporting learners in introductory programming assignments at scale is a necessity. This support includes automated feedback on what learners did incorrectly. Existing approaches cast the problem as automatically rep... 详细信息
来源: 评论
A control flow graph Optimization Method for Enhancing Fuzz Testing
收藏 引用
IEEE ACCESS 2024年 12卷 169370-169378页
作者: He, Yuan Xue, Bo Zhang, Lina Lu, Chengyang Dali Univ Sch Math & Comp Sci Dali 671003 Peoples R China
The American Fuzzy Lop (AFL) is a tool that automatically generates random data to expose vulnerabilities in software programs. However, it has some drawbacks, such as the lack of visibility in test case generation an... 详细信息
来源: 评论
Dynamic Taint Analysis with control flow graph for vulnerability Analysis
Dynamic Taint Analysis with Control Flow Graph for vulnerabi...
收藏 引用
2011 International conference on Instrumentation,Measurement,Computer,Communication and control (IMCCC2011)(第一届仪器测量、计算机通信与控制国际会议)
作者: Zhe Chen XinXin Zhang XiaoJuan Wang North electronic equipments research institute Beijing China Beijing Technology and Business University Beijing China
In recent years,software vulnerabilities are one of the main causes of security incidents in computer *** taint analysis is an efficient method to track the flow of sensitive information for soft vulnerability *** thi... 详细信息
来源: 评论
An Evaluation of Code Coverage Adequacy in Automatic Testing using control flow graph Visualization
An Evaluation of Code Coverage Adequacy in Automatic Testing...
收藏 引用
International Conference on Computer Applications and Industrial Electronics (ICCAIE)
作者: Ani Rahmani Joe Lian Min Asri Maspupah Politeknik Negeri Bandung Bandung Indonesia
There are some issues that frequently experienced by some software industries at the testing stage, that is the coverage test case. This is the extent to which the completeness of the test case in the tested unit prog... 详细信息
来源: 评论
Representing Database Application Interaction Structure Based on an Enhanced control flow graph
Representing Database Application Interaction Structure Base...
收藏 引用
2010 International Conference on Future Information Technology and Computing (FITC 2010)
作者: WANG Xi-wu,MI Dong,ZHONG Qi-gen,WANG Yin-long The Fifth Dept.of Ordnance Engeering College Shijiazhung,China
This paper explores an Enhanced control flow graph based methodology to representing database application interaction *** widely used in representing control flow structure of programs,CFG tends to confront with probl... 详细信息
来源: 评论
Discovering Vulnerable Functions by Extrapolation: A control-flow graph Similarity Based Approach  12th
Discovering Vulnerable Functions by Extrapolation: A Control...
收藏 引用
12th International Conference on Information Systems Security (ICISS)
作者: Jain, Lokesh Chandran, Aditya Rawat, Sanjay Srinathan, Kannan Int Inst Informat Technol Hyderabad Andhra Pradesh India Vrije Univ Amsterdam Netherlands
We present a method for vulnerability extrapolation to identify vulnerable functions in source code. Given a known vulnerable function, the proposed method extrapolates to find similar functions in the code base. Vuln... 详细信息
来源: 评论
Classifying Malware Represented as control flow graphs using Deep graph Convolutional Neural Network  49
Classifying Malware Represented as Control Flow Graphs using...
收藏 引用
49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
作者: Yan, Jiaqi Yan, Guanhua Jin, Dong IIT Chicago IL 60616 USA SUNY Binghamton Binghamton NY 13902 USA
Malware have been one of the biggest cyber threats in the digital world for a long time. Existing machine learning-based malware classification methods rely on handcrafted features extracted from raw binary files or d... 详细信息
来源: 评论
Directional graph Transformer-Based control flow Embedding for Malware Classification  22nd
Directional Graph Transformer-Based Control Flow Embedding f...
收藏 引用
22nd International Conference on Intelligent Data Engineering and Automated Learning
作者: Moon, Hyung-Jun Bu, Seok-Jun Cho, Sung-Bae Yonsei Univ Dept Artificial Intelligence Seoul 03722 South Korea Yonsei Univ Dept Comp Sci Seoul 03722 South Korea
Considering the fatality of malware attacks, the data-driven approach using massive malware observations has been verified. Deep learning-based approaches to learn the unified features by exploiting the local and sequ... 详细信息
来源: 评论
graph Learning on Instruction Stream-Augmented CFG for Malware Variant Detection
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2025年 20卷 3015-3030页
作者: Mi, Jiaxin Li, Qi Han, Zewei Liao, Weilue Fu, Junsong Beijing Univ Posts & Telecommun Sch Cyberspace Secur Beijing 100876 Peoples R China China Informat Technol Secur Evaluat Ctr Beijing 100085 Peoples R China
As malware as a service (MaaS) and organized attacks develop and drive a shift in malware variant generation mechanism, current variant detection, designed to counter conventional obfuscation and anti-detection strate... 详细信息
来源: 评论
Towards Improving the Performance of Comment Generation Models by Using BytecodeInformation
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2025年 第2期51卷 503-520页
作者: Huang, Yuan Huang, Jinbo Chen, Xiangping Zheng, Zibin Sun Yat Sen Univ Sch Software Engn Guangzhou Peoples R China GuangDong Engn Technol Res Ctr Blockchain Zhuhai 510006 Peoples R China Sun Yat Sen Univ Sch Journalism & Commun Guangzhou 510275 Peoples R China
Code comment plays an important role in program understanding, and a large number of automatic comment generation methods have been proposed in recent years. To get a better effect of generating comments, many studies... 详细信息
来源: 评论