咨询与建议

限定检索结果

文献类型

  • 110 篇 会议
  • 88 篇 期刊文献
  • 5 篇 学位论文

馆藏范围

  • 203 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 187 篇 工学
    • 152 篇 计算机科学与技术...
    • 75 篇 软件工程
    • 51 篇 电气工程
    • 25 篇 信息与通信工程
    • 12 篇 控制科学与工程
    • 7 篇 电子科学与技术(可...
    • 5 篇 网络空间安全
    • 4 篇 机械工程
    • 2 篇 材料科学与工程(可...
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 安全科学与工程
  • 13 篇 管理学
    • 12 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 10 篇 理学
    • 8 篇 数学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 军事学

主题

  • 203 篇 control flow gra...
  • 12 篇 static analysis
  • 9 篇 program dependen...
  • 8 篇 deep learning
  • 8 篇 software testing
  • 7 篇 program slicing
  • 7 篇 program analysis
  • 7 篇 data flow analys...
  • 7 篇 abstract syntax ...
  • 7 篇 malware detectio...
  • 6 篇 graph neural net...
  • 6 篇 flow graphs
  • 6 篇 vulnerability de...
  • 6 篇 cfg
  • 6 篇 malware
  • 5 篇 regression testi...
  • 5 篇 reverse engineer...
  • 5 篇 control flow int...
  • 5 篇 cybersecurity
  • 5 篇 symbolic executi...

机构

  • 5 篇 indian inst tech...
  • 3 篇 brno university ...
  • 3 篇 northwestern pol...
  • 2 篇 vnu univ engn & ...
  • 2 篇 zhongguancun lab...
  • 2 篇 sun yat sen univ...
  • 2 篇 sungkyunkwan uni...
  • 2 篇 东南大学
  • 2 篇 kagawa univ fac ...
  • 2 篇 delft univ techn...
  • 2 篇 peking univ key ...
  • 2 篇 beijing inst sys...
  • 2 篇 univ fed juiz de...
  • 2 篇 sun yat sen univ...
  • 2 篇 guangzhou univ s...
  • 2 篇 brandon univ dep...
  • 2 篇 natl inst techno...
  • 2 篇 the university o...
  • 2 篇 harbin engn univ...
  • 2 篇 peking univ sch ...

作者

  • 3 篇 alrasheed hend
  • 3 篇 rosen bk
  • 3 篇 mall r
  • 3 篇 ullah farhan
  • 3 篇 chimalakonda sri...
  • 3 篇 melton austin
  • 2 篇 zadeck fk
  • 2 篇 sofokleous anast...
  • 2 篇 facon adrien
  • 2 篇 ullah shamsher
  • 2 篇 xiaosen wen
  • 2 篇 lee kwangwoo
  • 2 篇 cao yongzhi
  • 2 篇 mund gb
  • 2 篇 gupta r
  • 2 篇 wegman mn
  • 2 篇 lukacs daniel
  • 2 篇 srivastava gauta...
  • 2 篇 wang ke-hui
  • 2 篇 xu baowen

语言

  • 193 篇 英文
  • 6 篇 其他
  • 3 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=Control Flow Graph"
203 条 记 录,以下是51-60 订阅
排序:
control flow-based opcode behavior analysis for Malware detection
收藏 引用
COMPUTERS & SECURITY 2014年 44卷 65-74页
作者: Ding, Yuxin Dai, Wei Yan, Shengli Zhang, Yumei Shenzhen Univ Town Harbin Inst Technol Shenzhen Grad Sch Shenzhen 518055 Peoples R China Chinese Acad Sci State Key Lab Comp Architecture Inst Comp Technol Beijing 100864 Peoples R China
Opcode sequences from decompiled executables have been employed to detect malware. Currently, opcode sequences are extracted using text-based methods, and the limitation of this method is that the extracted opcode seq... 详细信息
来源: 评论
GENERALIZED DOMINATORS
收藏 引用
INFORMATION PROCESSING LETTERS 1995年 第4期53卷 193-200页
作者: GUPTA, R Department of Computer Science University of Pittsburgh Pittsburgh PA 15260 USA
The notion of dominators is generalized to include multiple-vertex dominators in addition to traditional single-vertex dominators. A multiple-vertex dominator of a vertex is a group of vertices that collectively domin... 详细信息
来源: 评论
Measuring nesting
收藏 引用
IET SOFTWARE 2022年 第6期16卷 543-557页
作者: Alrasheed, Hend Melton, Austin King Saud Univ Dept Informat Technol Univ StPOB 145111 Riyadh Saudi Arabia Kent State Univ Dept Comp Sci Kent OH USA
Nesting is a fundamental and very commonly used programming construct. In many cases, the wise use of nesting contributes significantly to a programming team elegantly designing a solution to a difficult problem. Howe... 详细信息
来源: 评论
Computation of intraprocedural dynamic program slices
收藏 引用
INFORMATION AND SOFTWARE TECHNOLOGY 2003年 第8期45卷 499-512页
作者: Mund, GB Mall, R Sarkar, S Indian Inst Technol Dept Comp Sci & Engn Kharagpur 721302 W Bengal India
Dynamic slicing algorithms are used in interactive applications such as program debugging and testing. Therefore, these algorithms need to be very efficient. In this context, we propose three intraprocedural dynamic s... 详细信息
来源: 评论
Optimal test sequence generation using firefly algorithm
收藏 引用
SWARM AND EVOLUTIONARY COMPUTATION 2013年 8卷 44-53页
作者: Srivatsava, Praveen Ranjan Mallikarjun, B. Yang, Xin-She BITS Pilani Dept Comp Sci & Informat Syst Pilani Rajasthan India Univ Cambridge Dept Engn Cambridge CB2 1PZ England Middlesex Univ Sch Sci & Technol London NW4 4BT England
Software testing is an important but complex part of software development life cycle. The optimization of the software testing process is a major challenge, and the generation of the independent test paths remains uns... 详细信息
来源: 评论
A framework for quantitative evaluation of parallel control-flow obfuscation
收藏 引用
COMPUTERS & SECURITY 2012年 第8期31卷 886-896页
作者: Huang, Yu-Lun Tsai, Hsin-Yi Natl Chiao Tung Univ Inst Elect Control Engn Hsinchu Taiwan
Software obfuscation is intended to protect a program by thwarting reverse engineering. Several types of software obfuscation have been proposed, and control-flow obfuscation is a commonly adopted one. In this paper, ... 详细信息
来源: 评论
PaddyFrog: systematically detecting confused deputy vulnerability in Android applications
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2015年 第13期8卷 2338-2349页
作者: Wu, Jianliang Cui, Tingting Ban, Tao Guo, Shanqing Cui, Lizhen Shandong Univ Jinan 250100 Peoples R China Natl Inst Informat & Commun Technol Tokyo Japan
An enormous number of applications have been developed for Android in recent years, making it one of the most popular mobile operating systems. However, it is obvious that more vulnerabilities would appear along with ... 详细信息
来源: 评论
Visualization and Formalization of User Constraints for Tight Estimation of Worst-Case Execution Time
收藏 引用
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS 2009年 第1期E92D卷 24-31页
作者: Lee, Jong-In Bang, Ho-Jung Kim, Tai-Hyo Cha, Sung-Deok Korea Univ Dept Comp Sci & Engn Seoul South Korea Korea Adv Inst Sci & Technol Dependable Software Lab Div Comp Sci Taejon 305701 South Korea
Automated static timing analysis methods provide a safe but usually overestimated worst-case execution time (WCET) due to infeasible execution paths. In this paper, we propose a visual language, User Constraint Langua... 详细信息
来源: 评论
BovdGFE: buffer overflow vulnerability detection based on graph feature extraction
收藏 引用
APPLIED INTELLIGENCE 2023年 第12期53卷 15204-15221页
作者: Lv, Xinghang Peng, Tao Chen, Jia Liu, Junping Hu, Xinrong He, Ruhan Jiang, Minghua Cao, Wenli Wuhan Text Univ Sch Comp Sci & Artificial Intelligence Wuhan 430200 Hubei Peoples R China Hubei Prov Engn Res Ctr Intelligent Text & Fash Wuhan 430200 Hubei Peoples R China Engn Res Ctr Hubei Prov Clothing Informat Wuhan 430200 Hubei Peoples R China
Automatically detecting buffer overflow vulnerabilities is an important research topic in software security. Recent studies have shown that vulnerability detection performance utilizing deep learning-based techniques ... 详细信息
来源: 评论
CoSS: Leveraging Statement Semantics for Code Summarization
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2023年 第6期49卷 3472-3486页
作者: Shi, Chaochen Cai, Borui Zhao, Yao Gao, Longxiang Sood, Keshav Xiang, Yong Deakin Univ Sch Informat Technol Geelong Vic 3220 Australia Qilu Univ Technol Shandong Acad Sci Jinan 250103 Shandong Peoples R China
Automated code summarization tools allow generating descriptions for code snippets in natural language, which benefits software development and maintenance. Recent studies demonstrate that the quality of generated sum... 详细信息
来源: 评论