咨询与建议

限定检索结果

文献类型

  • 14 篇 会议
  • 12 篇 期刊文献

馆藏范围

  • 26 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22 篇 工学
    • 20 篇 计算机科学与技术...
    • 10 篇 软件工程
    • 6 篇 电气工程
    • 2 篇 信息与通信工程
    • 2 篇 控制科学与工程
  • 5 篇 理学
    • 4 篇 数学
    • 1 篇 物理学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 26 篇 control flow gra...
  • 3 篇 node splitting
  • 3 篇 compilation
  • 2 篇 compiler optimiz...
  • 2 篇 program analysis
  • 2 篇 reducibility
  • 2 篇 instruction-leve...
  • 2 篇 irreducibility
  • 2 篇 object-oriented ...
  • 2 篇 malware detectio...
  • 2 篇 convolutional ne...
  • 2 篇 software defect ...
  • 1 篇 global register ...
  • 1 篇 electromagnetic ...
  • 1 篇 cyber security
  • 1 篇 hyper-operation
  • 1 篇 permission contr...
  • 1 篇 program analysis...
  • 1 篇 compilers
  • 1 篇 firefly algorith...

机构

  • 1 篇 ist austria klos...
  • 1 篇 ferdowsi univ ma...
  • 1 篇 thiagarajar coll...
  • 1 篇 univ melbourne d...
  • 1 篇 lawrence livermo...
  • 1 篇 mahallat inst hi...
  • 1 篇 dartmouth coll h...
  • 1 篇 open univ nether...
  • 1 篇 gazi univ fac en...
  • 1 篇 univ saarland d-...
  • 1 篇 nasa ames res ct...
  • 1 篇 shanghai jiao to...
  • 1 篇 delft univ techn...
  • 1 篇 le quy don tech ...
  • 1 篇 virginia tech bl...
  • 1 篇 [a]data processi...
  • 1 篇 rvs coll engn de...
  • 1 篇 saudi aramco cor...
  • 1 篇 penn state univ ...
  • 1 篇 kaunas univ tech...

作者

  • 2 篇 cybenko george
  • 1 篇 peng hao
  • 1 篇 shar lwin khin
  • 1 篇 raz gil
  • 1 篇 stuckey peter j.
  • 1 篇 rajnish kumar
  • 1 篇 atici mehmet ali
  • 1 篇 bhattacharjee va...
  • 1 篇 tun yan naing
  • 1 篇 nitish kumar
  • 1 篇 bichhawat abhish...
  • 1 篇 henriques pedro ...
  • 1 篇 alotaibi saud s.
  • 1 篇 malviya vikas k.
  • 1 篇 xynyn ailys tee
  • 1 篇 devkota sabin
  • 1 篇 janssen johan
  • 1 篇 zhong ming
  • 1 篇 ji shouling
  • 1 篇 isaacs katherine...

语言

  • 25 篇 英文
  • 1 篇 中文
检索条件"主题词=Control Flow Graphs"
26 条 记 录,以下是1-10 订阅
排序:
Exceptional Interprocedural control flow graphs for x86-64 Binaries  21st
Exceptional Interprocedural Control Flow Graphs for x86-64 B...
收藏 引用
21st Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA)
作者: Bockenek, Joshua Verbeek, Freek Ravindran, Binoy Virginia Tech Blacksburg VA 24061 USA Open Univ Netherlands Heerlen Netherlands
Standard control flow graphs (CFGs) extracted from binaries by state-of-the-art disassembly/decompilation tools do not include information about exception-related control flow. However, such information is useful when... 详细信息
来源: 评论
Android Malware Analysis Approach Based on control flow graphs and Machine Learning Algorithms  4
Android Malware Analysis Approach Based on Control Flow Grap...
收藏 引用
4th International Symposium on Digital Forensic and Security (ISDFS)
作者: Atici, Mehmet Ali Sagiroglu, Seref Dogru, Ibrahim Alper Gazi Univ Fac Engn Dept Comp Engn Ankara Turkey
Smart devices from smartphones to wearable computers today have been used in many purposes. These devices run various mobile operating systems like Android, iOS, Symbian, Windows Mobile, etc. Since the mobile devices ... 详细信息
来源: 评论
Convolutional Neural Networks over control flow graphs for Software Defect Prediction  29
Convolutional Neural Networks over Control Flow Graphs for S...
收藏 引用
29th Annual IEEE International Conference on Tools with Artificial Intelligence (ICTAI)
作者: Anh Viet Phan Minh Le Nguyen Lam Thu Bui Japan Adv Inst Informat Technol Nomi 9231211 Japan Le Quy Don Tech Univ Hanoi Vietnam
Existing defects in software components is unavoidable and leads to not only a waste of time and money but also many serious consequences. To build predictive models, previous studies focus on manually extracting feat... 详细信息
来源: 评论
Evading control flow graph based GNN malware detectors via active opcode insertion method with maliciousness preserving
收藏 引用
SCIENTIFIC REPORTS 2025年 第1期15卷 1-19页
作者: Peng, Hao Yu, Zehao Zhao, Dandan Ding, Zhiguo Yang, Jieshuai Zhang, Bo Han, Jianming Zhang, Xuhong Ji, Shouling Zhong, Ming Zhejiang Normal Univ Coll Comp Sci & Technol Jinhua Zhejiang Peoples R China Zhejiang Normal Univ Key Lab Intelligent Educ Technol & Applicat Zhejia Jinhua 321004 Peoples R China Shanghai Jiao Tong Univ Sch Cyber Sci & Engn Shanghai Peoples R China Zhejiang Univ Coll Comp Sci & Technol Hangzhou Zhejiang Peoples R China Georgia Inst Technol Elect & Comp Engn Atlanta GA USA
With the continuous advancement of machine learning, numerous malware detection methods that leverage this technology have emerged, presenting new challenges to the generation of adversarial malware. Existing function... 详细信息
来源: 评论
Cognitive Complexity and Graph Convolutional Approach Over control flow Graph for Software Defect Prediction
收藏 引用
IEEE ACCESS 2022年 10卷 108870-108894页
作者: Gupta, Mansi Rajnish, Kumar Bhattacharjee, Vandana Birla Inst Technol Mesra Dept Comp Sci & Engn Ranchi 835215 Bihar India
The software engineering community is working to develop reliable metrics to improve software quality. It is estimated that understanding the source code accounts for 60% of the software maintenance effort. Cognitive ... 详细信息
来源: 评论
Making graphs reducible with controlled node splitting
收藏 引用
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS 1997年 第6期19卷 1031-1052页
作者: Janssen, J Corporaal, H Delft Univ Technol Dept Elect Engn NL-2600 GA Delft Netherlands
Several compiler optimizations, such as data, flow analysis, the exploitation of instruction-level parallelism (ILP), loop transformations, and memory disambiguation, require programs with reducible control flow graph... 详细信息
来源: 评论
Assertion-based slicing and slice graphs
收藏 引用
FORMAL ASPECTS OF COMPUTING 2012年 第2期24卷 217-248页
作者: Barros, Jose Bernardo da Cruz, Daniela Henriques, Pedro Rangel Pinto, Jorge Sousa Univ Minho Dept Informat CCTC P-4710057 Braga Portugal
This paper revisits the idea of slicing programs based on their axiomatic semantics, rather than using criteria based on control/data dependencies. We show how the forward propagation of preconditions and the backward... 详细信息
来源: 评论
A Buffered Genetic Algorithm for Automated Branch Coverage in Software Testing
收藏 引用
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 2019年 第2期35卷 245-273页
作者: Manikumar, T. Kumar, A. John Sanjeev RVS Coll Engn Dept Comp Applicat Dindigul 624005 Tamil Nadu India Thiagarajar Coll Engn Dept Comp Applicat Madurai 625015 Tamil Nadu India
Each and every software product has to be tested for assess its quality, which is time-consuming if it is performed manually. Moreover, it is difficult to generate all possible data for finite testing set. Search base... 详细信息
来源: 评论
Horn clauses as an intermediate representation for program analysis and transformation
收藏 引用
THEORY AND PRACTICE OF LOGIC PROGRAMMING 2015年 第4-5期15卷 526-542页
作者: Gange, Graeme Navas, Jorge A. Schachte, Peter Sondergaard, Harald Stuckey, Peter J. Univ Melbourne Dept Comp & Informat Syst Melbourne Vic 3010 Australia NASA Ames Res Ctr Moffett Field CA 94035 USA
Many recent analyses for conventional imperative programs begin by transforming programs into logic programs, capitalising on existing LP analyses and simple LP semantics. We propose using logic programs as an interme... 详细信息
来源: 评论
Mining execution relations for crosscutting concerns
收藏 引用
IET SOFTWARE 2008年 第2期2卷 65-78页
作者: Krinke, J. FernUniv Hagen Germany
Aspect mining tries to identify crosscutting concerns in the code of existing systems and thus supports their adaption to an aspect-oriented design. A semi-automatic static aspect mining approach is described, where c... 详细信息
来源: 评论