咨询与建议

限定检索结果

文献类型

  • 34 册 图书
  • 2 篇 会议

馆藏范围

  • 36 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1 篇 工学
    • 1 篇 控制科学与工程
    • 1 篇 计算机科学与技术...
    • 1 篇 软件工程
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 36 篇 code segment
  • 20 篇 segment
  • 19 篇 code
  • 15 篇 stack
  • 15 篇 program
  • 14 篇 manual
  • 13 篇 instruction
  • 12 篇 data
  • 12 篇 interrupt
  • 10 篇 byte
  • 10 篇 data segment
  • 9 篇 memory
  • 8 篇 file
  • 8 篇 privilege level
  • 8 篇 instruction set
  • 8 篇 intel
  • 7 篇 address
  • 7 篇 descriptor
  • 7 篇 real address
  • 7 篇 address mode

机构

  • 1 篇 shandong univers...
  • 1 篇 institute of inf...
  • 1 篇 guangdong power ...
  • 1 篇 national institu...

作者

  • 1 篇 ruigang liang
  • 1 篇 tao ban
  • 1 篇 ryoichi isawa
  • 1 篇 shanqing guo
  • 1 篇 zhongzheng tong
  • 1 篇 jiesheng zheng
  • 1 篇 koji nakao
  • 1 篇 daisuke inoue
  • 1 篇 guangcai wu

语言

  • 36 篇 英文
检索条件"主题词=code segment"
36 条 记 录,以下是31-40 订阅
排序:
Xerox :: Mesa :: 4.0 1978 :: Listing :: Mesa 4 Microcode :: *** Sep78
收藏 引用
2016年
Xerox :: Mesa :: 4.0 1978 :: Listing :: Mesa 4 Microcode :: *** Sep78 by published by
来源: 评论
Complete Amiga C (1994-01)(Future Publishing)(Gb)[supplement, Issue 33]
收藏 引用
2016年
Complete Amiga C (1994-01)(Future Publishing)(Gb)[supplement, Issue 33] by published by
来源: 评论
Ibm :: System3 :: Plm :: Ly21-0517-6 Ibm System-3 Disk Sort Program Logic Manual Dec75
收藏 引用
2016年
Ibm :: System3 :: Plm :: Ly21-0517-6 Ibm System-3 Disk Sort Program Logic Manual Dec75 by published by
来源: 评论
Hp :: 3000 :: Seriesiii :: 30000-90020 Serii-Iiiref 78
收藏 引用
2016年
Hp :: 3000 :: Seriesiii :: 30000-90020 Serii-Iiiref 78 by published by
来源: 评论
code Confusion Confrontation Method Based on Feature Comparison
Code Confusion Confrontation Method Based on Feature Compari...
收藏 引用
International Conference on Intelligent Computing, Automation and Systems (ICICAS)
作者: Jiesheng Zheng Zhongzheng Tong Guangcai Wu Ruigang Liang Guangdong Power Grid Co. Ltd. Guangzhou China Institute of Information Engineering Chinese Academy of Sciences Beijing China
With the maturity of code hardening technology, more and more malicious applications have adopted the reinforcement technology to avoid the detection of anti-virus engines, which brings great challenges for the identi... 详细信息
来源: 评论
Application of String Kernel based Support Vector Machine for Malware Packer Identification
Application of String Kernel based Support Vector Machine fo...
收藏 引用
International Joint Conference on Neural Networks
作者: Tao BAN Ryoichi ISAWA Shanqing GUO Daisuke INOUE Koji NAKAO National Institute of Information and Communications Technology Japan. Shandong University Jinan China.
Packing is among the most popular obfuscation techniques to impede anti-virus scanners from successfully detecting malware. In this paper we propose a string-kernel-based support vector machine classifier to identify ... 详细信息
来源: 评论