咨询与建议

限定检索结果

文献类型

  • 112 篇 会议
  • 87 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 201 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 188 篇 工学
    • 153 篇 计算机科学与技术...
    • 74 篇 软件工程
    • 52 篇 电气工程
    • 25 篇 信息与通信工程
    • 11 篇 控制科学与工程
    • 7 篇 电子科学与技术(可...
    • 5 篇 网络空间安全
    • 4 篇 机械工程
    • 2 篇 材料科学与工程(可...
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 安全科学与工程
  • 13 篇 管理学
    • 12 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 10 篇 理学
    • 8 篇 数学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 军事学

主题

  • 201 篇 control flow gra...
  • 12 篇 static analysis
  • 9 篇 program dependen...
  • 9 篇 software testing
  • 8 篇 deep learning
  • 7 篇 program slicing
  • 7 篇 program analysis
  • 7 篇 data flow analys...
  • 7 篇 abstract syntax ...
  • 7 篇 malware detectio...
  • 6 篇 graph neural net...
  • 6 篇 flow graphs
  • 6 篇 vulnerability de...
  • 6 篇 malware
  • 5 篇 regression testi...
  • 5 篇 reverse engineer...
  • 5 篇 control flow int...
  • 5 篇 cybersecurity
  • 5 篇 cfg
  • 5 篇 symbolic executi...

机构

  • 5 篇 indian inst tech...
  • 3 篇 northwestern pol...
  • 2 篇 vnu univ engn & ...
  • 2 篇 zhongguancun lab...
  • 2 篇 sun yat sen univ...
  • 2 篇 sungkyunkwan uni...
  • 2 篇 东南大学
  • 2 篇 kagawa univ fac ...
  • 2 篇 delft univ techn...
  • 2 篇 peking univ key ...
  • 2 篇 beijing inst sys...
  • 2 篇 univ fed juiz de...
  • 2 篇 sun yat sen univ...
  • 2 篇 guangzhou univ s...
  • 2 篇 brandon univ dep...
  • 2 篇 natl inst techno...
  • 2 篇 the university o...
  • 2 篇 harbin engn univ...
  • 2 篇 peking univ sch ...
  • 2 篇 zhejiang univ co...

作者

  • 3 篇 alrasheed hend
  • 3 篇 rosen bk
  • 3 篇 mall r
  • 3 篇 ullah farhan
  • 3 篇 chimalakonda sri...
  • 3 篇 melton austin
  • 2 篇 zadeck fk
  • 2 篇 sofokleous anast...
  • 2 篇 facon adrien
  • 2 篇 ullah shamsher
  • 2 篇 xiaosen wen
  • 2 篇 lee kwangwoo
  • 2 篇 cao yongzhi
  • 2 篇 mund gb
  • 2 篇 gupta r
  • 2 篇 wegman mn
  • 2 篇 lukacs daniel
  • 2 篇 srivastava gauta...
  • 2 篇 wang ke-hui
  • 2 篇 timbert michael

语言

  • 191 篇 英文
  • 6 篇 其他
  • 3 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=Control Flow Graph"
201 条 记 录,以下是41-50 订阅
排序:
APP-Miner: Detecting API Misuses via Automatically Mining API Path Patterns  45
APP-Miner: Detecting API Misuses via Automatically Mining AP...
收藏 引用
45th IEEE Symposium on Security and Privacy (SP)
作者: Jiang, Jiasheng Wu, Jingzheng Ling, Xiang Luo, Tianyue Qu, Sheng Wu, Yanjun Chinese Acad Sci Inst Software Beijing Peoples R China
Extracting API patterns from the source code has been extensively employed to detect API misuses. However, recent studies manually provide pattern templates as prerequisites, requiring prior software knowledge and lim... 详细信息
来源: 评论
graphRTL: an Agile Design Framework of RTL Code from Data flow graphs
GraphRTL: an Agile Design Framework of RTL Code from Data Fl...
收藏 引用
2nd International Symposium of Electronics Design Automation (ISEDA)
作者: Qiao, Yuheng Xie, Cai Ou, Zhaoting Lei, Peizhi Tian, Yan Chen, Jienan Univ Elect Sci & Technol China Chengdu 611731 Peoples R China
As the increasing demand for large and complex signal processing requirements, the efficient and fast design of signal processing circuits becomes an important issues. Agile design offers a new approach for rapid hard... 详细信息
来源: 评论
Measuring nesting
收藏 引用
IET SOFTWARE 2022年 第6期16卷 543-557页
作者: Alrasheed, Hend Melton, Austin King Saud Univ Dept Informat Technol Univ StPOB 145111 Riyadh Saudi Arabia Kent State Univ Dept Comp Sci Kent OH USA
Nesting is a fundamental and very commonly used programming construct. In many cases, the wise use of nesting contributes significantly to a programming team elegantly designing a solution to a difficult problem. Howe... 详细信息
来源: 评论
A Software QA Framework for Autonomous Vehicle open source application: OpenPilot  9
A Software QA Framework for Autonomous Vehicle open source a...
收藏 引用
9th IEEE World Forum on the Internet of Things (WF-IoT) - The Blue Planet - A Marriage of Sea and Space
作者: Ali, Khalid Jammal, Manar Abu Sharkh, Mohamed York Univ Sch Informat Technol Toronto ON Canada Ferris State Univ Digital Media Software Engn Grand Rapids MI USA
As the deployment of autonomous vehicles (AV) grows, ensuring their reliability and safety becomes paramount. The need for rigorous testing and validation methods is surging. This paper focuses on investigating the re... 详细信息
来源: 评论
LSAFE: a Lightweight Static Analysis Framework for binary Executables
LSAFE: a Lightweight Static Analysis Framework for binary Ex...
收藏 引用
2024 International Performance Computing and Communications Conference
作者: Yue, Xiao Qu, Guangzhi Oakland Univ Dept Comp Sci & Engn Rochester MI 48063 USA
Static analysis is a widely used technique for analyzing various aspects of programs. However, as programs become more complex, static analysis tools require larger resources, such as CPU time and memory, to perform t... 详细信息
来源: 评论
A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization
收藏 引用
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS 2022年 第1期11卷 1-21页
作者: Ullah, Farhan Srivastava, Gautam Ullah, Shamsher Northwestern Polytech Univ Sch Software Xian 710072 Peoples R China Brandon Univ Dept Math & Comp Sci Brandon MB R7A 6A9 Canada China Med Univ Res Ctr Interneural Comp Taichung 40402 Taiwan Lebanese Amer Univ Dept Comp Sci & Math Beirut 1102 Lebanon
Android is the most widely used mobile platform, making it a prime target for malicious attacks. Therefore, it is imperative to effectively circumvent these attacks. Recently, machine learning has been a promising sol... 详细信息
来源: 评论
Arvin: Greybox Fuzzing Using Approximate Dynamic CFG Analysis  23
Arvin: Greybox Fuzzing Using Approximate Dynamic CFG Analysi...
收藏 引用
18th ACM ASIA Conference on Computer and Communications Security (ASIA CCS)
作者: Shahini, Sirus Zhang, Mu Payer, Mathias Ricci, Robert Univ Utah Salt Lake City UT 84112 USA Ecole Polytech Fed Lausanne Lausanne Switzerland
Fuzzing has emerged as the most broadly used testing technique to discover bugs. Effective fuzzers rely on coverage to prioritize inputs that exercise new program areas. Edge-based code coverage of the Program Under T... 详细信息
来源: 评论
A vulnerability detection framework with enhanced graph feature learning
收藏 引用
JOURNAL OF SYSTEMS AND SOFTWARE 2024年 216卷
作者: Cheng, Jianxin Chen, Yizhou Cao, Yongzhi Wang, Hanpin Peking Univ Key Lab High Confidence Software Technol Minist Educ Beijing Peoples R China Peking Univ Sch Comp Sci Beijing Peoples R China Zhongguancun Lab Beijing Peoples R China Guangzhou Univ Sch Comp Sci & Cyber Engn Guangzhou Peoples R China
Vulnerability detection in smart contracts is critical to secure blockchain systems. Existing methods represent the bytecode as a graph structure and leverage graph neural networks to learn graph features for vulnerab... 详细信息
来源: 评论
A vulnerability detection framework by focusing on critical execution paths
收藏 引用
INFORMATION AND SOFTWARE TECHNOLOGY 2024年 174卷
作者: Cheng, Jianxin Chen, Yizhou Cao, Yongzhi Wang, Hanpin Peking Univ Key Lab High Confidence Software Technol Minist Educ Beijing Peoples R China Peking Univ Sch Comp Sci Beijing Peoples R China Zhongguancun Lab Beijing Peoples R China Guangzhou Univ Sch Comp Sci & Cyber Engn Guangzhou Peoples R China
Context: Vulnerability detection is critical to ensure software security, and detecting vulnerabilities in smart contract code is currently gaining massive attention. Existing deep learning -based vulnerability detect... 详细信息
来源: 评论
COBREX: A Tool for Extracting Business Rules from COBOL  39
COBREX: A Tool for Extracting Business Rules from COBOL
收藏 引用
39th IEEE International Conference on Software Maintenance and Evolution (ICSME)
作者: Ali, Mir Sameed Manjunath, Nikhil Chimalakonda, Sridhar Indian Inst Technol Tirupati Dept Comp Sci & Engn Res Intelligent Software & Human Analyt RISHA Lab Tirupati Andhra Pradesh India
COBOL (Common Business-Oriented Language) has had a strong presence for the last five decades and is still prevalent in the finance and banking sectors and other organizations. The systems which were earlier written i... 详细信息
来源: 评论