咨询与建议

限定检索结果

文献类型

  • 111 篇 会议
  • 88 篇 期刊文献
  • 5 篇 学位论文

馆藏范围

  • 204 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 188 篇 工学
    • 153 篇 计算机科学与技术...
    • 75 篇 软件工程
    • 51 篇 电气工程
    • 26 篇 信息与通信工程
    • 13 篇 控制科学与工程
    • 7 篇 电子科学与技术(可...
    • 6 篇 网络空间安全
    • 4 篇 机械工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 生物医学工程(可授...
  • 14 篇 管理学
    • 13 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
    • 1 篇 工商管理
  • 11 篇 理学
    • 9 篇 数学
    • 2 篇 统计学(可授理学、...
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
    • 1 篇 系统科学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 军事学

主题

  • 204 篇 control flow gra...
  • 12 篇 static analysis
  • 9 篇 program dependen...
  • 8 篇 deep learning
  • 8 篇 abstract syntax ...
  • 8 篇 software testing
  • 7 篇 program slicing
  • 7 篇 program analysis
  • 7 篇 data flow analys...
  • 7 篇 malware detectio...
  • 6 篇 graph neural net...
  • 6 篇 flow graphs
  • 6 篇 vulnerability de...
  • 6 篇 cfg
  • 6 篇 malware
  • 5 篇 regression testi...
  • 5 篇 reverse engineer...
  • 5 篇 control flow int...
  • 5 篇 cybersecurity
  • 5 篇 symbolic executi...

机构

  • 5 篇 indian inst tech...
  • 3 篇 brno university ...
  • 3 篇 northwestern pol...
  • 2 篇 vnu univ engn & ...
  • 2 篇 zhongguancun lab...
  • 2 篇 sun yat sen univ...
  • 2 篇 sungkyunkwan uni...
  • 2 篇 东南大学
  • 2 篇 kagawa univ fac ...
  • 2 篇 delft univ techn...
  • 2 篇 peking univ key ...
  • 2 篇 beijing inst sys...
  • 2 篇 univ fed juiz de...
  • 2 篇 sun yat sen univ...
  • 2 篇 guangzhou univ s...
  • 2 篇 brandon univ dep...
  • 2 篇 natl inst techno...
  • 2 篇 the university o...
  • 2 篇 harbin engn univ...
  • 2 篇 peking univ sch ...

作者

  • 3 篇 alrasheed hend
  • 3 篇 rosen bk
  • 3 篇 mall r
  • 3 篇 ullah farhan
  • 3 篇 chimalakonda sri...
  • 3 篇 melton austin
  • 2 篇 zadeck fk
  • 2 篇 sofokleous anast...
  • 2 篇 facon adrien
  • 2 篇 ullah shamsher
  • 2 篇 xiaosen wen
  • 2 篇 lee kwangwoo
  • 2 篇 cao yongzhi
  • 2 篇 mund gb
  • 2 篇 gupta r
  • 2 篇 wegman mn
  • 2 篇 lukacs daniel
  • 2 篇 srivastava gauta...
  • 2 篇 wang ke-hui
  • 2 篇 xu baowen

语言

  • 193 篇 英文
  • 7 篇 其他
  • 3 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=Control Flow Graph"
204 条 记 录,以下是61-70 订阅
Improving Coverage and Vulnerability Detection in Smart Contract Testing Using Self-Adaptive Learning GA
收藏 引用
IETE JOURNAL OF RESEARCH 2024年 第2期70卷 1593-1606页
作者: Sujeetha, R. Akila, K. SRM Inst Sci & Technol Coll Engn & Technol Dept Comp Sci & Engn 1 Jawaharlal Nehru RdVadapalani Campus Chennai Tamil Nadu India
In the domain of software testing, the generation of test cases is a critical process for detecting system errors and bugs. However, automated test case generation for smart contracts often encounters challenges relat... 详细信息
来源: 评论
CoSS: Leveraging Statement Semantics for Code Summarization
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2023年 第6期49卷 3472-3486页
作者: Shi, Chaochen Cai, Borui Zhao, Yao Gao, Longxiang Sood, Keshav Xiang, Yong Deakin Univ Sch Informat Technol Geelong Vic 3220 Australia Qilu Univ Technol Shandong Acad Sci Jinan 250103 Shandong Peoples R China
Automated code summarization tools allow generating descriptions for code snippets in natural language, which benefits software development and maintenance. Recent studies demonstrate that the quality of generated sum... 详细信息
来源: 评论
An Approach for Detecting Unnecessary Cyclomatic Complexity on Source Code
收藏 引用
IEEE LATIN AMERICA TRANSACTIONS 2016年 第8期14卷 3777-3783页
作者: Campos Junior, H. S. Martins Filho, L. R. V. Araujo, M. A. P. IF Sudeste MG Campus Juiz de Fora Juiz De Fora MG Brazil Univ Fed Juiz de Fora Juiz De Fora MG Brazil
Seeking product's quality is essential nowadays. One of the many quality aspects in software development is the source code complexity. Not taking care for the complexity during the development can result in unexp... 详细信息
来源: 评论
Auditing the XSS defence features implemented in web application programs
收藏 引用
IET SOFTWARE 2012年 第4期6卷 377-390页
作者: Shar, L. K. Tan, H. B. K. Nanyang Technol Univ Sch Elect & Elect Engn Singapore 639798 Singapore
Cross site scripting (XSS) vulnerability is mainly caused by the failure of web applications in sanitising user inputs embedded in web pages. Even though state-of-the-art defensive coding methods and vulnerability det... 详细信息
来源: 评论
CONCURRENT PROCESS MONITORING WITH NO REFERENCE SIGNATURES
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 1994年 第4期43卷 475-480页
作者: UPADHYAYA, SJ RAMAMURTHY, B Dept. of Electr. & Comput. Eng. State Univ. of New York Buffalo NY USA
A simple, inexpensive and time/space efficient signature technique for process monitoring is presented. In this technique, a known signature function is applied to the instruction stream at compilation phase and when ... 详细信息
来源: 评论
Vulnerability Detection by Learning From Syntax-Based Execution Paths of Code
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2023年 第8期49卷 4196-4212页
作者: Zhang, Junwei Liu, Zhongxin Hu, Xing Xia, Xin Li, Shanping Zhejiang Univ Coll Comp Sci & Technol Hangzhou 310027 Zhejiang Peoples R China Zhejiang Univ Sch Software Technol Ningbo 315103 Zhejiang Peoples R China
Vulnerability detection is essential to protect software systems. Various approaches based on deep learning have been proposed to learn the pattern of vulnerabilities and identify them. Although these approaches have ... 详细信息
来源: 评论
An efficient method for computing dynamic program slices
收藏 引用
INFORMATION PROCESSING LETTERS 2002年 第2期81卷 111-117页
作者: Goswami, D Mall, R Indian Inst Technol Dept Comp Sci & Engn Kharagpur 721302 W Bengal India
We propose an efficient method for computing dynamic slices of programs. Our method is based on construction of data dependence edges of program dependence graph at run-time. We introduce the concept of compact dynami... 详细信息
来源: 评论
MalGNE: Enhancing the Performance and Efficiency of CFG-Based Malware Detector by graph Node Embedding in Low Dimension Space
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2024年 19卷 4881-4896页
作者: Peng, Hao Yang, Jieshuai Zhao, Dandan Xu, Xiaogang Pu, Yuwen Han, Jianmin Yang, Xing Zhong, Ming Ji, Shouling Zhejiang Normal Univ Coll Comp Sci & Technol Jinhua 321004 Peoples R China Zhejiang Normal Univ Key Lab Intelligent Educ Technol & Applicat Jinhua 321004 Peoples R China Zhejiang Univ Inst Cyberspace Res Hangzhou 310027 Zhejiang Peoples R China Zhejiang Univ Coll Comp Sci & Technol Hangzhou 310027 Zhejiang Peoples R China Georgia Inst Technol Sch Elect & Comp Engn Atlanta GA 30332 USA
The rich semantic information in control flow graphs (CFGs) of executable programs has made graph Neural Networks (GNNs) a key focus for malware detection. However, existing CFG-based detection techniques face limitat... 详细信息
来源: 评论
THE COMBINING DAG - A TECHNIQUE FOR PARALLEL DATA-flow ANALYSIS
收藏 引用
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 1994年 第8期5卷 805-813页
作者: KRAMER, R GUPTA, R SOFFA, ML Department of Computer Science University of Pittsburgh Pittsburgh PA USA
As the number of available multiprocessors increases, so does the importance of providing software support for these systems, including parallel compilers. Data flow analysis, an important component of software tools,... 详细信息
来源: 评论
Symbolic execution based test-patterns generation algorithm for hardware Trojan detection
收藏 引用
COMPUTERS & SECURITY 2018年 78卷 267-280页
作者: Shen, Lixiang Mu, Dejun Cao, Guo Qin, Maoyuan Blackstone, Jeremy Kastner, Ryan Northwestern Polytech Univ Sch Automat Xian 710072 Shaanxi Peoples R China Changzhou Inst Technol Sch Comp Informat & Engn Changzhou 213032 Jiangsu Peoples R China Northwestern Polytech Univ Sch Management Xian 710072 Shaanxi Peoples R China Changzhou Inst Technol Sch Econ & Management Changzhou 213032 Jiangsu Peoples R China Univ Calif San Diego Dept Comp Sci & Engn San Diego CA 92093 USA
Hardware Trojan detection is a very difficult challenge. However, the combination of symbolic execution and metamorphic testing is useful for detecting hardware Trojans in Verilog code. In this paper, symbolic executi... 详细信息
来源: 评论