咨询与建议

限定检索结果

文献类型

  • 8 篇 会议
  • 5 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 14 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11 篇 工学
    • 8 篇 计算机科学与技术...
    • 4 篇 电气工程
    • 4 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 信息与通信工程
    • 1 篇 仪器科学与技术
    • 1 篇 生物工程
  • 1 篇 理学
    • 1 篇 生物学
  • 1 篇 医学

主题

  • 14 篇 executable file
  • 2 篇 lagrange interpo...
  • 2 篇 mimicry (behavio...
  • 2 篇 payload
  • 2 篇 scheme
  • 2 篇 reverse engineer...
  • 2 篇 malware
  • 2 篇 confidential inf...
  • 2 篇 camouflage
  • 2 篇 backdoor data
  • 2 篇 authentication m...
  • 1 篇 input file
  • 1 篇 doc2vec
  • 1 篇 performance
  • 1 篇 network infrastr...
  • 1 篇 compilers
  • 1 篇 instrumentation
  • 1 篇 access control
  • 1 篇 edge commands
  • 1 篇 cursor

机构

  • 1 篇 csir inst genom ...
  • 1 篇 computer science...
  • 1 篇 univ kentucky co...
  • 1 篇 school of electr...
  • 1 篇 univ indonesia e...
  • 1 篇 graduate studies...
  • 1 篇 institute of mat...
  • 1 篇 deakin univ sch ...
  • 1 篇 graduate school ...
  • 1 篇 russian acad sci...
  • 1 篇 deakin univ cybe...
  • 1 篇 esime culhuacan ...
  • 1 篇 adi shankara ins...
  • 1 篇 beijing univ pos...
  • 1 篇 natl def acad de...
  • 1 篇 cdac resource ct...
  • 1 篇 univ salerno dep...
  • 1 篇 school of scienc...
  • 1 篇 school of comput...

作者

  • 1 篇 salman muhammad
  • 1 篇 perez-meana hect...
  • 1 篇 baig zubair
  • 1 篇 huang xiao-jun
  • 1 篇 kurmangaleev sh....
  • 1 篇 gaissaryan s. s.
  • 1 篇 larus jr
  • 1 篇 gallegos-garcia ...
  • 1 篇 mekala sri harsh...
  • 1 篇 yuki kuwahara
  • 1 篇 hector perez-mea...
  • 1 篇 ramachandran s
  • 1 篇 viani nindya
  • 1 篇 palmieri frances...
  • 1 篇 gina gallegos-ga...
  • 1 篇 pizzolante raffa...
  • 1 篇 sharma vk
  • 1 篇 nakano-miyatake ...
  • 1 篇 dija s.
  • 1 篇 ivan castillo-ca...

语言

  • 14 篇 英文
检索条件"主题词=Executable File"
14 条 记 录,以下是1-10 订阅
排序:
Research and Implementation of executable file Compression for Mobile Terminals of MIS
Research and Implementation of Executable File Compression f...
收藏 引用
Global Mobile Congress 2009
作者: Huang Xiao-jun Yang Jing Du Wen Beijing Univ Posts & Telecom Key Lab Univ Wireless Commun Minist Educ Beijing Peoples R China
An executable file compression solution for mobile terminals of MIS was proposed, optimal compression algorithm was selected and ported to BREW platform. Meanwhile, concrete implementation of this proposal was given. ... 详细信息
来源: 评论
REWRITING executable fileS TO MEASURE PROGRAM BEHAVIOR
收藏 引用
SOFTWARE-PRACTICE & EXPERIENCE 1994年 第2期24卷 197-218页
作者: LARUS, JR BALL, T Computer Sciences Department University of Wisconsin-Madison 1210 West Dayton Street Madison WI 53706 U.S.A.
Inserting instrumentation code in a program is an effective technique for detecting, recording, an measuring many aspects of a program's performance. Instrumentation code can be added at any stage of the compilati... 详细信息
来源: 评论
Static Analysis Method on Portable executable files for REMNUX based Malware Identification  10
Static Analysis Method on Portable Executable Files for REMN...
收藏 引用
IEEE 10th International Conference on Awareness Science and Technology (iCAST)
作者: Salman, Muhammad Husna, Diyanatul Viani, Nindya Univ Indonesia Elect Engn Dept Depok Indonesia
Malware is one of the most dangerous threats in the digital world today and in the future. Today, technological developments do not only give benefits but also reap serious challenges. One of the threats is the breach... 详细信息
来源: 评论
Application of compiler transformations against software vulnerabilities exploitation
收藏 引用
PROGRAMMING AND COMPUTER SOFTWARE 2015年 第4期41卷 231-236页
作者: Nurmukhametov, A. R. Kurmangaleev, Sh. F. Kaushan, V. V. Gaissaryan, S. S. Russian Acad Sci Inst Syst Programming Moscow 109004 Russia
Software vulnerabilities are a serious threat for security of information systems. Any software written in C/C++ contain considerable amount of vulnerabilities. Some of them can be used by attackers to seize control o... 详细信息
来源: 评论
Ransomware Attacks of the COVID-19 Pandemic: Novel Strains, Victims, and Threat Actors
收藏 引用
IT PROFESSIONAL 2023年 第5期25卷 37-44页
作者: Baig, Zubair Mekala, Sri Harsha Zeadally, Sherali Deakin Univ Sch Informat Technol Cybersecur Geelong Vic 3216 Australia Deakin Univ Cybersecur Geelong Vic 3216 Australia Univ Kentucky Coll Commun & Informat Lexington KY 40506 USA
The COVID-19 pandemic has exposed many organizational vulnerabilities to cyber threats, with ransomware being at the top of the list. These can be attributed mainly to consolidated accessibility as organizational visi... 详细信息
来源: 评论
Improved Secret Image Sharing Scheme with Payload Optimization
Improved Secret Image Sharing Scheme with Payload Optimizati...
收藏 引用
55th IEEE International Midwest Symposium on Circuits and Systems (MWSCAS)
作者: Espejel-Trujillo, Angelina Castillo-Camacho, Ivan Nakano-Miyatake, Mariko Gallegos-Garcia, Gina Perez-Meana, Hector ESIME CULHUACAN IPN Grad Studies & Res Sect Mexico City DF Mexico
This paper presents an improvement of interpolation-based (k,n)-threshold secret image sharing (SIS) scheme, where a secret data payload is optimized using Lagrange Interpolation operated in GF(2(8)). A secret data ca... 详细信息
来源: 评论
Detecting Forensically Relevant Information From PE executables
Detecting Forensically Relevant Information From PE Executab...
收藏 引用
International Conference on Recent Trends in Information Technology (ICRTIT)
作者: Jophin, Shany Vijayan, Meera Dija, S. Adi Shankara Inst Engn & Technol Dept Comp Sci Kalady India CDAC Resource Ctr Cyber Forens Trivandrum Kerala India
Cyber forensics analysis is the procedure to find crucial evidence with respect to a crime from a digital media. Malware forensics and Network security plays a crucial role in the current scenario where malware attack... 详细信息
来源: 评论
Detecting Unknown Malware from ASCII Strings with Natural Language Processing Techniques  14
Detecting Unknown Malware from ASCII Strings with Natural La...
收藏 引用
14th Annual Asia Joint Conference on Information Security (AsiaJCIS)
作者: Ito, Ryo Mimura, Mamoru Natl Def Acad Dept Comp Sci Yokosuka Kanagawa Japan
Attackers often use an executable file (malware) as a tool to obtain sensitive information from specific companies and individuals. Anti-virus software attempts to detect the malware by pattern matching method etc. Ho... 详细信息
来源: 评论
Sgi :: Iris4D :: 007-0904-020 Learning to Debug with Edge Fortran Edition V2.0 1988
收藏 引用
2016年
Sgi :: Iris4D :: 007-0904-020 Learning to Debug with Edge Fortran Edition V2.0 1988 by published by
来源: 评论
ArrayD: A general purpose software for Microarray design
收藏 引用
BMC BIOINFORMATICS 2004年 第1期5卷 142-142页
作者: Sharma, A Srivastava, GP Sharma, VK Ramachandran, S CSIR Inst Genom & Integrat Biol Delhi 110007 India
Background: Microarray is a high-throughput technology to study expression of thousands of genes in parallel. A critical aspect of microarray production is the design aimed at space optimization while maximizing the n... 详细信息
来源: 评论