咨询与建议

限定检索结果

文献类型

  • 1 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 2 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 2 篇 计算机科学与技术...
    • 1 篇 电气工程
    • 1 篇 信息与通信工程
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 2 篇 source code obfu...
  • 1 篇 control-flow rec...
  • 1 篇 source code anti...
  • 1 篇 control-flow obf...
  • 1 篇 source code opti...
  • 1 篇 source code plag...
  • 1 篇 program similari...

机构

  • 1 篇 univ newcastle c...
  • 1 篇 korea univ grad ...

作者

  • 1 篇 lin yuqing
  • 1 篇 cheers hayden
  • 1 篇 smith shamus p.
  • 1 篇 lee dong hoon
  • 1 篇 lee young bi
  • 1 篇 suk jae hyuk

语言

  • 2 篇 英文
检索条件"主题词=source code obfuscation"
2 条 记 录,以下是1-10 订阅
排序:
Detecting Pervasive source code Plagiarism through Dynamic Program Behaviours  20
Detecting Pervasive Source Code Plagiarism through Dynamic P...
收藏 引用
Proceedings of the 22nd Australasian Computing Education Conference (ACE)
作者: Cheers, Hayden Lin, Yuqing Smith, Shamus P. Univ Newcastle Callaghan NSW Australia
source code plagiarism is a persistent problem in undergraduate computer science education. Unfortunately, it is a widespread phenomena with many students plagiarising either because they are unwilling or incapable of... 详细信息
来源: 评论
SCORE: source code Optimization & REconstruction
收藏 引用
IEEE ACCESS 2020年 8卷 129478-129496页
作者: Suk, Jae Hyuk Lee, Young Bi Lee, Dong Hoon Korea Univ Grad Sch Informat Secur Seoul 02841 South Korea
The main goal of obfuscation is to make software difficult to analyze. Although obfuscation is one useful method to protect programs, the ability to analyze malware is greatly reduced if used for malicious purposes. T... 详细信息
来源: 评论