咨询与建议

限定检索结果

文献类型

  • 17 篇 会议
  • 10 篇 期刊文献

馆藏范围

  • 27 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24 篇 工学
    • 18 篇 计算机科学与技术...
    • 12 篇 软件工程
    • 9 篇 电气工程
    • 2 篇 信息与通信工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 化学工程与技术
    • 1 篇 核科学与技术
  • 3 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 2 篇 理学
    • 1 篇 数学
    • 1 篇 化学
  • 2 篇 医学
    • 1 篇 临床医学
    • 1 篇 药学(可授医学、理...
  • 1 篇 经济学
    • 1 篇 理论经济学
  • 1 篇 文学

主题

  • 27 篇 executable code
  • 4 篇 language
  • 3 篇 runtime
  • 3 篇 codes
  • 3 篇 legal executions
  • 2 篇 domains
  • 2 篇 algorithms
  • 2 篇 end users
  • 2 篇 reverse engineer...
  • 2 篇 refining
  • 2 篇 verification
  • 2 篇 computer personn...
  • 2 篇 computer softwar...
  • 2 篇 microsoft window...
  • 1 篇 conferences
  • 1 篇 state machines
  • 1 篇 networks(communi...
  • 1 篇 compilers
  • 1 篇 macros
  • 1 篇 scalability

机构

  • 1 篇 imag lab grenobl...
  • 1 篇 microsoft
  • 1 篇 univ maryland de...
  • 1 篇 st petersburg na...
  • 1 篇 univ colorado bo...
  • 1 篇 univ innsbruck i...
  • 1 篇 software verific...
  • 1 篇 inria rennes ren...
  • 1 篇 virtual vehicle ...
  • 1 篇 inserm u968 f-75...
  • 1 篇 soloviev rybinsk...
  • 1 篇 etri network sec...
  • 1 篇 psl res univ min...
  • 1 篇 brunel univ dept...
  • 1 篇 beijing jiaotong...
  • 1 篇 etri informat se...
  • 1 篇 isfahan univ tec...
  • 1 篇 npp satek plus l...
  • 1 篇 columbia univ de...
  • 1 篇 iit kanpur kanpu...

作者

  • 1 篇 karner michael
  • 1 篇 kim ikkyun
  • 1 篇 gu dawu
  • 1 篇 baradaran sara
  • 1 篇 jaeger t
  • 1 篇 talpin jean-pier...
  • 1 篇 naygandhi hiren
  • 1 篇 han kijun
  • 1 篇 duda a
  • 1 篇 elwazeer khaled
  • 1 篇 keromytis angelo...
  • 1 篇 ethan jackson
  • 1 篇 vivek gupta
  • 1 篇 heidari mahdi
  • 1 篇 zhang yuanyuan
  • 1 篇 ding zhijun
  • 1 篇 kang koohong
  • 1 篇 wang junli
  • 1 篇 kamali ali
  • 1 篇 bernd fischer

语言

  • 27 篇 英文
检索条件"主题词=Executable code"
27 条 记 录,以下是1-10 订阅
排序:
executable code recognition in network flows using instruction transition probabilities
Executable code recognition in network flows using instructi...
收藏 引用
10th IAPR Conference on Machine Vision Applications (MVA2007)
作者: Kim, Ikkyun Kang, Koohong Choi, Yangseo Kim, Daewon Oh, Jintae Jang, Jongsoo Han, Kijun ETRI Informat Secur Res Div Taejon 305700 South Korea Seowon Univ 231 Dept Informat & Commun Engn Chonju 361742 South Korea Kyungpook Natl Univ Dept Comp Engn Taegu 702701 South Korea
The ability to recognize quickly inside network flows to be executable is prerequisite for malware detection. For this purpose, we introduce an instruction transition probability matrix (ITPX) which is comprised of th... 详细信息
来源: 评论
An executable code Authorization Model for Secure Operating System
An Executable Code Authorization Model for Secure Operating ...
收藏 引用
International Symposium on Electronic Commerce and Security
作者: Chen Zemao Wu Xiaoping Tang Weimin Naval Univ Engn Dept Informat Secur Wuhan 430033 Hubei Peoples R China Beijing Jiaotong Univ Sch Comp Beijing 100044 Peoples R China
executable code not effectively inspected and authorized before its execution has been one of the key reasons for wild spread of malicious codes. This paper proposes a program file authorization model based on an inte... 详细信息
来源: 评论
Improved Algorithm for Identification of Switch Tables in executable code  17
Improved Algorithm for Identification of Switch Tables in Ex...
收藏 引用
Conference of Open Innovations Association FRUCT
作者: Gedich, Andrei Lazdin, Artur St Petersburg Natl Res Univ Informat Technol Mech St Petersburg Russia
This paper introduces novel approach for identification of switch tables in executable code. Compared to existing solutions based on SSA intermediate representation and different propagation techniques, developed algo... 详细信息
来源: 评论
Software Architecture for Scalable Computing Systems with Automatic Granularity Selection of executable code  17
Software Architecture for Scalable Computing Systems with Au...
收藏 引用
Conference of Open Innovations Association FRUCT
作者: Pavlov, Mikhail Petrov, Alexander NPP SATEK Plus LTD Rybinsk Russia Soloviev Rybinsk State Aviat Tech Univ Rybinsk Russia
The problem of developing software architecture and its platform implementation for scalable cloud services is addressed in the paper. New scheme of distributed software developing and executing is presented with argu... 详细信息
来源: 评论
executable code: what, why and how
收藏 引用
Pharmaceutical Programming 2012年 第1期5卷 65-69页
作者: Naygandhi, Hiren Roche Products Ltd Welwyn Garden City UK
The pharmaceutical industry is continually evolving as it meets the on-going demands of external pressures such as rising development costs, patents, regulatory bodies and patients. Programmers can contribute by, acce... 详细信息
来源: 评论
From Agent Interaction Protocols to executable code: A Model-driven Approach  09
From Agent Interaction Protocols to Executable Code: A Model...
收藏 引用
International Conference on Autonomous Agents and Multiagent Systems
作者: Christian Hahn Ingo Zinnikus Stefan Warwas Klaus Fischer German Research Center for Artificial Intelligence (DFKI)
In this paper, we demonstrate how to design protocols with the platform independent modeling language for multiagent systems (DSML4MAS) and discuss a model-driven approach to use protocol descriptions as a base for ge... 详细信息
来源: 评论
A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY 2023年 第5期22卷 1277-1290页
作者: Baradaran, Sara Heidari, Mahdi Kamali, Ali Mouzarani, Maryam Isfahan Univ Technol Dept Elect & Comp Engn Esfahan Iran
Memory corruption is a serious class of software vulnerabilities, which requires careful attention to be detected and removed from applications before getting exploited and harming the system users. Symbolic execution... 详细信息
来源: 评论
AN executable SERVICE COMPOSITION code AUTOMATIC CREATION TOOL BASED ON PETRI NET MODEL
收藏 引用
COMPUTING AND INFORMATICS 2013年 第5期32卷 968-986页
作者: Ding, Zhijun Liu, Jieqi Wang, Junli Wang, Fang Tongji Univ Dept Comp Sci & Technol Shanghai 201084 Peoples R China Brunel Univ Dept Informat Syst & Comp Uxbridge UB8 3PH Middx England
For Web services composition problem, this paper proposes an executable code creation algorithm to model Web services composition based on Petri net model, and develops an executable composition code automatic creatio... 详细信息
来源: 评论
Lowering barriers to interaction: Programming without code
Lowering barriers to interaction: Programming without code
收藏 引用
IEEE Symposium on Visual Languages and Human-Centric Computing
作者: Brand, Catharine Univ Colorado Boulder CO 80309 USA
We developed a method of annotating pre-existing software so that an end-user can change the underlying program via an interface created from the annotations and generate new executable code.
来源: 评论
IMPLEMENTING REMOTE EVALUATION
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 1990年 第7期16卷 710-722页
作者: STAMOS, JW GIFFORD, DK MIT COMP SCI LABCAMBRIDGEMA 02139
Remote evaluation (REV) is a construct for building distributed systems that involves sending executable code from one computer to another computer via a communication network. How REV can reduce communication and imp... 详细信息
来源: 评论