咨询与建议

限定检索结果

文献类型

  • 111 篇 会议
  • 87 篇 期刊文献
  • 5 篇 学位论文

馆藏范围

  • 203 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 187 篇 工学
    • 152 篇 计算机科学与技术...
    • 74 篇 软件工程
    • 51 篇 电气工程
    • 26 篇 信息与通信工程
    • 12 篇 控制科学与工程
    • 7 篇 电子科学与技术(可...
    • 5 篇 网络空间安全
    • 4 篇 机械工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 生物医学工程(可授...
  • 14 篇 管理学
    • 13 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
    • 1 篇 工商管理
  • 11 篇 理学
    • 9 篇 数学
    • 2 篇 统计学(可授理学、...
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
    • 1 篇 系统科学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 军事学

主题

  • 203 篇 control flow gra...
  • 12 篇 static analysis
  • 9 篇 program dependen...
  • 8 篇 deep learning
  • 8 篇 abstract syntax ...
  • 8 篇 software testing
  • 7 篇 program slicing
  • 7 篇 program analysis
  • 7 篇 data flow analys...
  • 7 篇 malware detectio...
  • 6 篇 graph neural net...
  • 6 篇 flow graphs
  • 6 篇 vulnerability de...
  • 6 篇 cfg
  • 6 篇 malware
  • 5 篇 regression testi...
  • 5 篇 reverse engineer...
  • 5 篇 control flow int...
  • 5 篇 cybersecurity
  • 5 篇 symbolic executi...

机构

  • 5 篇 indian inst tech...
  • 3 篇 brno university ...
  • 3 篇 northwestern pol...
  • 2 篇 vnu univ engn & ...
  • 2 篇 zhongguancun lab...
  • 2 篇 sun yat sen univ...
  • 2 篇 sungkyunkwan uni...
  • 2 篇 东南大学
  • 2 篇 kagawa univ fac ...
  • 2 篇 delft univ techn...
  • 2 篇 peking univ key ...
  • 2 篇 beijing inst sys...
  • 2 篇 univ fed juiz de...
  • 2 篇 sun yat sen univ...
  • 2 篇 guangzhou univ s...
  • 2 篇 brandon univ dep...
  • 2 篇 natl inst techno...
  • 2 篇 the university o...
  • 2 篇 harbin engn univ...
  • 2 篇 peking univ sch ...

作者

  • 3 篇 alrasheed hend
  • 3 篇 rosen bk
  • 3 篇 mall r
  • 3 篇 ullah farhan
  • 3 篇 chimalakonda sri...
  • 3 篇 melton austin
  • 2 篇 zadeck fk
  • 2 篇 sofokleous anast...
  • 2 篇 facon adrien
  • 2 篇 ullah shamsher
  • 2 篇 xiaosen wen
  • 2 篇 lee kwangwoo
  • 2 篇 cao yongzhi
  • 2 篇 mund gb
  • 2 篇 gupta r
  • 2 篇 wegman mn
  • 2 篇 lukacs daniel
  • 2 篇 srivastava gauta...
  • 2 篇 wang ke-hui
  • 2 篇 xu baowen

语言

  • 192 篇 英文
  • 7 篇 其他
  • 3 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=Control Flow Graph"
203 条 记 录,以下是61-70 订阅
排序:
CONCURRENT PROCESS MONITORING WITH NO REFERENCE SIGNATURES
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 1994年 第4期43卷 475-480页
作者: UPADHYAYA, SJ RAMAMURTHY, B Department of Electrical and Computer Engineering State University of New York Buffalo NY USA
A simple, inexpensive and time/space efficient signature technique for process monitoring is presented. In this technique, a known signature function is applied to the instruction stream at compilation phase and when ... 详细信息
来源: 评论
Improvements of Directed Automated Random Testing in Test Data Generation for C plus plus Projects
收藏 引用
INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING 2019年 第9期29卷 1279-1312页
作者: Duc-Anh Nguyen Tran Nguyen Huong Hieu Vo Dinh Pham Ngoc Hung VNU Univ Engn & Technol Hanoi Vietnam
This paper improves the breadth-first search strategy in directed automated random testing (DART) to generate a fewer number of test data while gaining higher branch coverage, namely Static DART or SDART for short. In... 详细信息
来源: 评论
SEMIAUTOMATIC TEST SUITE GENERATION FROM ESTELLE
收藏 引用
SOFTWARE ENGINEERING JOURNAL 1992年 第4期7卷 295-307页
作者: FORGHANI, B SARIKAYA, B BELL NO RES DEPT 7W21OTTAWA K1Y 4H7ONTARIOCANADA UNIV MONTREAL DEPT IRO CP6128MONTREAL H3C 3J7QUEBECCANADA
Overviews of the standard formal specification language Estelle and test suite specification language TTCN are provided. Steps involved in semi-automatic generation of TTCN test suites from Estelle are introduced. Det... 详细信息
来源: 评论
control flow-based opcode behavior analysis for Malware detection
收藏 引用
COMPUTERS & SECURITY 2014年 44卷 65-74页
作者: Ding, Yuxin Dai, Wei Yan, Shengli Zhang, Yumei Shenzhen Univ Town Harbin Inst Technol Shenzhen Grad Sch Shenzhen 518055 Peoples R China Chinese Acad Sci State Key Lab Comp Architecture Inst Comp Technol Beijing 100864 Peoples R China
Opcode sequences from decompiled executables have been employed to detect malware. Currently, opcode sequences are extracted using text-based methods, and the limitation of this method is that the extracted opcode seq... 详细信息
来源: 评论
A framework for quantitative evaluation of parallel control-flow obfuscation
收藏 引用
COMPUTERS & SECURITY 2012年 第8期31卷 886-896页
作者: Huang, Yu-Lun Tsai, Hsin-Yi Natl Chiao Tung Univ Inst Elect Control Engn Hsinchu Taiwan
Software obfuscation is intended to protect a program by thwarting reverse engineering. Several types of software obfuscation have been proposed, and control-flow obfuscation is a commonly adopted one. In this paper, ... 详细信息
来源: 评论
MalGNE: Enhancing the Performance and Efficiency of CFG-Based Malware Detector by graph Node Embedding in Low Dimension Space
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2024年 19卷 4881-4896页
作者: Peng, Hao Yang, Jieshuai Zhao, Dandan Xu, Xiaogang Pu, Yuwen Han, Jianmin Yang, Xing Zhong, Ming Ji, Shouling Zhejiang Normal Univ Coll Comp Sci & Technol Jinhua 321004 Peoples R China Zhejiang Normal Univ Key Lab Intelligent Educ Technol & Applicat Jinhua 321004 Peoples R China Zhejiang Univ Inst Cyberspace Res Hangzhou 310027 Zhejiang Peoples R China Zhejiang Univ Coll Comp Sci & Technol Hangzhou 310027 Zhejiang Peoples R China Georgia Inst Technol Sch Elect & Comp Engn Atlanta GA 30332 USA
The rich semantic information in control flow graphs (CFGs) of executable programs has made graph Neural Networks (GNNs) a key focus for malware detection. However, existing CFG-based detection techniques face limitat... 详细信息
来源: 评论
Symbolic execution based test-patterns generation algorithm for hardware Trojan detection
收藏 引用
COMPUTERS & SECURITY 2018年 78卷 267-280页
作者: Shen, Lixiang Mu, Dejun Cao, Guo Qin, Maoyuan Blackstone, Jeremy Kastner, Ryan Northwestern Polytech Univ Sch Automat Xian 710072 Shaanxi Peoples R China Changzhou Inst Technol Sch Comp Informat & Engn Changzhou 213032 Jiangsu Peoples R China Northwestern Polytech Univ Sch Management Xian 710072 Shaanxi Peoples R China Changzhou Inst Technol Sch Econ & Management Changzhou 213032 Jiangsu Peoples R China Univ Calif San Diego Dept Comp Sci & Engn San Diego CA 92093 USA
Hardware Trojan detection is a very difficult challenge. However, the combination of symbolic execution and metamorphic testing is useful for detecting hardware Trojans in Verilog code. In this paper, symbolic executi... 详细信息
来源: 评论
CoSS: Leveraging Statement Semantics for Code Summarization
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2023年 第6期49卷 3472-3486页
作者: Shi, Chaochen Cai, Borui Zhao, Yao Gao, Longxiang Sood, Keshav Xiang, Yong Deakin Univ Sch Informat Technol Geelong Vic 3220 Australia Qilu Univ Technol Shandong Acad Sci Jinan 250103 Shandong Peoples R China
Automated code summarization tools allow generating descriptions for code snippets in natural language, which benefits software development and maintenance. Recent studies demonstrate that the quality of generated sum... 详细信息
来源: 评论
THE COMBINING DAG - A TECHNIQUE FOR PARALLEL DATA-flow ANALYSIS
收藏 引用
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 1994年 第8期5卷 805-813页
作者: KRAMER, R GUPTA, R SOFFA, ML Department of Computer Science University of Pittsburgh Pittsburgh PA USA
As the number of available multiprocessors increases, so does the importance of providing software support for these systems, including parallel compilers. Data flow analysis, an important component of software tools,... 详细信息
来源: 评论
BCGen: a comment generation method for bytecode
收藏 引用
AUTOMATED SOFTWARE ENGINEERING 2023年 第1期30卷 1-31页
作者: Huang, Yuan Huang, Jinbo Chen, Xiangping He, Kunning Zhou, Xiaocong Sun Yat Sen Univ Sch Software Engn Zhuhai 519000 Guangdong Peoples R China Sun Yat Sen Univ Sch Journalism & Commun Guangdong Key Lab Big Data Anal & Simulat Publ Opi Guangzhou 510000 Guangdong Peoples R China Sun Yat Sen Univ Sch Comp Sci & Engn Guangzhou 510000 Guangdong Peoples R China
Bytecode is a form of instruction set designed for efficient execution by a software interpreter. Unlike human-readable source code, bytecode is even harder to understand for programmers and researchers. Bytecode has ... 详细信息
来源: 评论