咨询与建议

限定检索结果

文献类型

  • 111 篇 会议
  • 88 篇 期刊文献
  • 5 篇 学位论文

馆藏范围

  • 204 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 188 篇 工学
    • 153 篇 计算机科学与技术...
    • 75 篇 软件工程
    • 51 篇 电气工程
    • 26 篇 信息与通信工程
    • 13 篇 控制科学与工程
    • 7 篇 电子科学与技术(可...
    • 6 篇 网络空间安全
    • 4 篇 机械工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 生物医学工程(可授...
  • 14 篇 管理学
    • 13 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
    • 1 篇 工商管理
  • 11 篇 理学
    • 9 篇 数学
    • 2 篇 统计学(可授理学、...
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
    • 1 篇 系统科学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 军事学

主题

  • 204 篇 control flow gra...
  • 12 篇 static analysis
  • 9 篇 program dependen...
  • 8 篇 deep learning
  • 8 篇 abstract syntax ...
  • 8 篇 software testing
  • 7 篇 program slicing
  • 7 篇 program analysis
  • 7 篇 data flow analys...
  • 7 篇 malware detectio...
  • 6 篇 graph neural net...
  • 6 篇 flow graphs
  • 6 篇 vulnerability de...
  • 6 篇 cfg
  • 6 篇 malware
  • 5 篇 regression testi...
  • 5 篇 reverse engineer...
  • 5 篇 control flow int...
  • 5 篇 cybersecurity
  • 5 篇 symbolic executi...

机构

  • 5 篇 indian inst tech...
  • 3 篇 brno university ...
  • 3 篇 northwestern pol...
  • 2 篇 vnu univ engn & ...
  • 2 篇 zhongguancun lab...
  • 2 篇 sun yat sen univ...
  • 2 篇 sungkyunkwan uni...
  • 2 篇 东南大学
  • 2 篇 kagawa univ fac ...
  • 2 篇 delft univ techn...
  • 2 篇 peking univ key ...
  • 2 篇 beijing inst sys...
  • 2 篇 univ fed juiz de...
  • 2 篇 sun yat sen univ...
  • 2 篇 guangzhou univ s...
  • 2 篇 brandon univ dep...
  • 2 篇 natl inst techno...
  • 2 篇 the university o...
  • 2 篇 harbin engn univ...
  • 2 篇 peking univ sch ...

作者

  • 3 篇 alrasheed hend
  • 3 篇 rosen bk
  • 3 篇 mall r
  • 3 篇 ullah farhan
  • 3 篇 chimalakonda sri...
  • 3 篇 melton austin
  • 2 篇 zadeck fk
  • 2 篇 sofokleous anast...
  • 2 篇 facon adrien
  • 2 篇 ullah shamsher
  • 2 篇 xiaosen wen
  • 2 篇 lee kwangwoo
  • 2 篇 cao yongzhi
  • 2 篇 mund gb
  • 2 篇 gupta r
  • 2 篇 wegman mn
  • 2 篇 lukacs daniel
  • 2 篇 srivastava gauta...
  • 2 篇 wang ke-hui
  • 2 篇 xu baowen

语言

  • 193 篇 英文
  • 7 篇 其他
  • 3 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=Control Flow Graph"
204 条 记 录,以下是81-90 订阅
control flow based cost analysis for P4
收藏 引用
OPEN COMPUTER SCIENCE 2020年 第1期11卷 70-79页
作者: Lukacs, Daniel Pongracz, Gergely Tejfel, Mate Eotvos Lorand Univ Fac Informat Budapest Hungary Ericsson Hungary Ltd Budapest Hungary 3in Res Grp Martonvasar Hungary
The networking industry is currently undergoing a steady trend of softwarization. Yet, network engineers suffer from the lack of software development tools that support programming of new protocols. We are creating a ... 详细信息
来源: 评论
NEW PERFORMANCE ESTIMATION FORMULA FOR EVOLUTIONARY TESTING OF SWITCH-CASE CONSTRUCTS
收藏 引用
SCALABLE COMPUTING-PRACTICE AND EXPERIENCE 2013年 第1期14卷 57-68页
作者: Latiu, Gentiana Ioana Cret, Octavian Augustin Vacariu, Lucia Tech Univ Cluj Napoca Comp Sci Dept 26-28 George Baritiu St Cluj Napoca 400027 Romania
Evolutionary structural testing is a technique that uses sp ecific approaches based on guided searches algorithms. It involves evaluating fitness functions to determine wheth er test data satisfy or not various struct... 详细信息
来源: 评论
Research of the control Domain of Edges in Regression Testing
收藏 引用
Journal of Donghua University(English Edition) 2005年 第3期22卷 57-61页
作者: 高建华 Department of Computer Science and Technology Shanghai Normal University Shanghai 200234China
Regression testing is the process of validating modified software to provide confidence that the changed parts of the software behave as intended and that the unchanged parts have not been adversely affected by the mo... 详细信息
来源: 评论
Research of Software Complexity Metrics with Security Indicator
收藏 引用
Journal of Donghua University(English Edition) 2011年 第5期28卷 460-464页
作者: 付剑晶 王珂 Institute of Remote Sensing and Information System Zhejiang University School of Information Technology Zhejiang University of Finances and Economics
Software protection technology has been universally emphasized, with the development of reverse engineering and static analysis techniques. So, it is important to research how to quantitatively evaluate the security o... 详细信息
来源: 评论
State dependency probabilistic model for fault localization
收藏 引用
INFORMATION AND SOFTWARE TECHNOLOGY 2015年 第Jan.期57卷 430-445页
作者: Gong Dandan Su Xiaohong Wang Tiantian Ma Peijun Wang Yu Harbin Inst Technol Sch Comp Sci & Technol Harbin 150001 Peoples R China Shanghai Acad Spaceflight Technol Shanghai 201109 Peoples R China
Context: Fault localization is an important and expensive activity in software debugging. Previous studies indicated that statistically-based fault-localization techniques are effective in prioritizing the possible fa... 详细信息
来源: 评论
Evaluation of Countermeasures Against Fault Attacks on Smart Cards
收藏 引用
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS 2011年 第2期5卷 49-60页
作者: Sere, Ahmadou A. Iguchi-Cartigny, Julien Lanet, Jean-Louis Univ Limoges SSD XLIM Labs JIDE83 Rue Isle Limoges France
Java Card are devices subject to either hardware and software attacks. Thus several countermeasures need to be embedded to avoid the effects of these attacks. Recently, the idea to combine logical attacks with a physi... 详细信息
来源: 评论
Probabilistic error propagation model for mechatronic systems
收藏 引用
MECHATRONICS 2014年 第8期24卷 1189-1202页
作者: Morozov, Andrey Janschek, Klaus Tech Univ Dresden Inst Automat D-01062 Dresden Germany
This paper addresses a probabilistic approach to error propagation analysis of a mechatronic system. These types of systems require highly abstractive models for the proper mapping of the mutual interaction of heterog... 详细信息
来源: 评论
Automated System for Numerical Similarity Evaluation of Android Applications
收藏 引用
AUTOMATIC DOCUMENTATION AND MATHEMATICAL LINGUISTICS 2024年 第SUPPL3期58卷 S131-S142页
作者: Petrov, V. V. Kazan Fed Univ Inst Informat Technol & Intelligent Syst Kazan 420008 Russia
This paper is devoted to the design and development of a system for automating numerical similarity assessment of Android applications. The task of the evaluation of application similarity is reduced to the similarity... 详细信息
来源: 评论
Markov chain dynamic representation model for reliability testing
Markov chain dynamic representation model for reliability te...
收藏 引用
12th International Conference on the Experience of Designing and Application of CAD Systems in Microelectronics (CADSM)
作者: Vitaliy, Yakovyna Pavlo, Serdyuk Oksana, Nytrebych Lviv Polytech Natl Univ Software Dept S Bandery St 28 Lvov Ukraine
In this paper we propose to use software classes as actual components and to build the control flow graph to represent software architecture using suffix tree. The proposed model of dynamic collection and storage of r... 详细信息
来源: 评论
Recovering the Memory Behavior of Executable Programs
Recovering the Memory Behavior of Executable Programs
收藏 引用
10th IEEE Working Conference on Source Code Analysis and Manipulation (SCAM)
作者: Ketterlin, Alain Clauss, Philippe INRIA CAMUS Team Rocquencourt France Univ Strasbourg Strasbourg France
This paper deals with the binary analysis of executable programs, with the goal of understanding how they access memory. It explains how to statically build a formal model of all memory accesses. Starting with a contr... 详细信息
来源: 评论