咨询与建议

限定检索结果

文献类型

  • 111 篇 会议
  • 88 篇 期刊文献
  • 5 篇 学位论文

馆藏范围

  • 204 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 188 篇 工学
    • 153 篇 计算机科学与技术...
    • 75 篇 软件工程
    • 51 篇 电气工程
    • 26 篇 信息与通信工程
    • 13 篇 控制科学与工程
    • 7 篇 电子科学与技术(可...
    • 6 篇 网络空间安全
    • 4 篇 机械工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 生物医学工程(可授...
  • 14 篇 管理学
    • 13 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
    • 1 篇 工商管理
  • 11 篇 理学
    • 9 篇 数学
    • 2 篇 统计学(可授理学、...
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
    • 1 篇 系统科学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 军事学

主题

  • 204 篇 control flow gra...
  • 12 篇 static analysis
  • 9 篇 program dependen...
  • 8 篇 deep learning
  • 8 篇 abstract syntax ...
  • 8 篇 software testing
  • 7 篇 program slicing
  • 7 篇 program analysis
  • 7 篇 data flow analys...
  • 7 篇 malware detectio...
  • 6 篇 graph neural net...
  • 6 篇 flow graphs
  • 6 篇 vulnerability de...
  • 6 篇 cfg
  • 6 篇 malware
  • 5 篇 regression testi...
  • 5 篇 reverse engineer...
  • 5 篇 control flow int...
  • 5 篇 cybersecurity
  • 5 篇 symbolic executi...

机构

  • 5 篇 indian inst tech...
  • 3 篇 brno university ...
  • 3 篇 northwestern pol...
  • 2 篇 vnu univ engn & ...
  • 2 篇 zhongguancun lab...
  • 2 篇 sun yat sen univ...
  • 2 篇 sungkyunkwan uni...
  • 2 篇 东南大学
  • 2 篇 kagawa univ fac ...
  • 2 篇 delft univ techn...
  • 2 篇 peking univ key ...
  • 2 篇 beijing inst sys...
  • 2 篇 univ fed juiz de...
  • 2 篇 sun yat sen univ...
  • 2 篇 guangzhou univ s...
  • 2 篇 brandon univ dep...
  • 2 篇 natl inst techno...
  • 2 篇 the university o...
  • 2 篇 harbin engn univ...
  • 2 篇 peking univ sch ...

作者

  • 3 篇 alrasheed hend
  • 3 篇 rosen bk
  • 3 篇 mall r
  • 3 篇 ullah farhan
  • 3 篇 chimalakonda sri...
  • 3 篇 melton austin
  • 2 篇 zadeck fk
  • 2 篇 sofokleous anast...
  • 2 篇 facon adrien
  • 2 篇 ullah shamsher
  • 2 篇 xiaosen wen
  • 2 篇 lee kwangwoo
  • 2 篇 cao yongzhi
  • 2 篇 mund gb
  • 2 篇 gupta r
  • 2 篇 wegman mn
  • 2 篇 lukacs daniel
  • 2 篇 srivastava gauta...
  • 2 篇 wang ke-hui
  • 2 篇 xu baowen

语言

  • 193 篇 英文
  • 7 篇 其他
  • 3 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=Control Flow Graph"
204 条 记 录,以下是71-80 订阅
BCGen: a comment generation method for bytecode
收藏 引用
AUTOMATED SOFTWARE ENGINEERING 2023年 第1期30卷 1-31页
作者: Huang, Yuan Huang, Jinbo Chen, Xiangping He, Kunning Zhou, Xiaocong Sun Yat Sen Univ Sch Software Engn Zhuhai 519000 Guangdong Peoples R China Sun Yat Sen Univ Sch Journalism & Commun Guangdong Key Lab Big Data Anal & Simulat Publ Opi Guangzhou 510000 Guangdong Peoples R China Sun Yat Sen Univ Sch Comp Sci & Engn Guangzhou 510000 Guangdong Peoples R China
Bytecode is a form of instruction set designed for efficient execution by a software interpreter. Unlike human-readable source code, bytecode is even harder to understand for programmers and researchers. Bytecode has ... 详细信息
来源: 评论
Clone detection in 5G-enabled social IoT system using graph semantics and deep learning model
收藏 引用
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS 2021年 第11期12卷 3115-3127页
作者: Ullah, Farhan Naeem, Muhammad Rashid Mostarda, Leonardo Shah, Syed Aziz Northwestern Polytech Univ Sch Software Xian Shaanxi Peoples R China Leshan Normal Univ Sch Artificial Intelligence Leshan 614000 Peoples R China Camerino Univ Comp Sci Dept I-62032 Camerino Italy Coventry Univ Mobile Hlth Ctr Intelligent Healthcare Coventry CV1 5FB W Midlands England
The protection and privacy of the 5G-IoT framework is a major challenge due to the vast number of mobile devices. Specialized applications running these 5G-IoT systems may be vulnerable to clone attacks. Cloning appli... 详细信息
来源: 评论
A WELL-DEFINED ESTELLE SPECIFICATION FOR THE AUTOMATIC TEST-GENERATION
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 1991年 第4期40卷 526-542页
作者: LEE, DY LEE, JY Dept. of Comput. Sci. Pohang Inst. of Sci. & Technol. Kyungbuk South Korea
For the automatic test generation in conformance testing, the first step is to derive a single FSM (finite state machine) from the formal specification, which does not loose any semantics of the formal language. The n... 详细信息
来源: 评论
An efficient dynamic program slicing technique
收藏 引用
INFORMATION AND SOFTWARE TECHNOLOGY 2002年 第2期44卷 123-132页
作者: Mund, GB Mall, R Sarkar, S Indian Inst Technol Dept Comp Sci & Engn Kharagpur 721302 W Bengal India
An important application of the dynamic program slicing technique is program debugging. In applications such as interactive debugging, the dynamic slicing algorithm needs to be efficient. In this context, we propose a... 详细信息
来源: 评论
Detecting application logic vulnerabilities via finding incompatibility between application design and implementation
收藏 引用
IET SOFTWARE 2020年 第4期14卷 377-388页
作者: Ghorbanzadeh, Mahmoud Shahriari, Hamid Reza Amirkabir Univ Technol Dept Comp Engn Tehran Iran
Logic vulnerabilities are due to defects in the application logic implementation such that the application logic is not the logic that was expected. Indeed, such vulnerabilities pattern depends on the design and busin... 详细信息
来源: 评论
A generalized structural model of structured programs for software metrics definition
收藏 引用
SOFTWARE QUALITY JOURNAL 2002年 第2期10卷 149-167页
作者: Cogan, B Shalfeeva, E London Metropolitan Univ Sch Comp Commun Technol & Math London N7 8DB England Russian Acad Sci Inst Automat & Control Proc Far Eastern Branch Vladivostok 690041 Russia
There are many different types of models to describe various aspects of software from inception to completion. Some of these models are the basis for de ning software metrics. In this paper, we propose a generalized f... 详细信息
来源: 评论
Dflow: A data flow analysis tool for C/C plus
收藏 引用
IEEJ TRANSACTIONS ON ELECTRICAL AND ELECTRONIC ENGINEERING 2021年 第12期16卷 1635-1641页
作者: Yan, Qiaoqiao Li, Yongjun Wu, Yuanhao Zhou, Jialong Northwestern Polytech Univ Sch Comp Xian 710072 Shaanxi Peoples R China
.Abstract syntax trees (ASTs), control flow graphs (CFGs), and data flow analysis (DFA) are prerequisites for static and dynamic analysis and vulnerability detection for programs;thus, obtaining them is significant. R... 详细信息
来源: 评论
An efficient interprocedural dynamic slicing method
收藏 引用
JOURNAL OF SYSTEMS AND SOFTWARE 2006年 第6期79卷 791-806页
作者: Mund, G. B. Mall, Rajib Kalinga Inst Ind Technol Dept Comp Sci & Engn Bhubaneswar 751024 Orissa India Indian Inst Technol Dept Comp Sci & Engn Kharagpur 721302 W Bengal India
We present an efficient interprocedural dynamic slicing algorithm for structured programs. We first propose an intraprocedural dynamic slicing algorithm, and subsequently extend it to handle interprocedural calls. Our... 详细信息
来源: 评论
An Approach to Vulnerability Searching of Integer Overflows in the Executable Program Code
收藏 引用
AUTOMATIC control AND COMPUTER SCIENCES 2018年 第8期52卷 1022-1028页
作者: Demidov, R. A. Pechenkin, A. I. Zegzhda, P. D. Peter Great St Petersburg Polytech Univ St Petersburg 195251 Russia
This article proposes an approach to identifying integer overflow vulnerabilities in software represented by the executable code of x86 architecture. The approach is based on symbolic code execution and initially twof... 详细信息
来源: 评论
A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization
收藏 引用
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS 2022年 第1期11卷 1-21页
作者: Ullah, Farhan Srivastava, Gautam Ullah, Shamsher Northwestern Polytech Univ Sch Software Xian 710072 Peoples R China Brandon Univ Dept Math & Comp Sci Brandon MB R7A 6A9 Canada China Med Univ Res Ctr Interneural Comp Taichung 40402 Taiwan Lebanese Amer Univ Dept Comp Sci & Math Beirut 1102 Lebanon
Android is the most widely used mobile platform, making it a prime target for malicious attacks. Therefore, it is imperative to effectively circumvent these attacks. Recently, machine learning has been a promising sol... 详细信息
来源: 评论