Search Results - "Dynamic binary code analysis"
-
1
Authors: et al.
Source: 2022 9th International Conference on Dependable Systems and Their Applications (DSA). :995-996
-
2
Authors:
Source: PROCEEDINGS OF THE 2024 WORKSHOP ON RESEARCH ON OFFENSIVE AND DEFENSIVE TECHNIQUES IN THE CONTEXT OF MAN AT THE END (MATE) ATTACKS, CHECKMATE 2024 ; ISBN: 9798400712302
Subject Terms: Technology and Engineering, Dynamic binary code analysis, cryptographic key identification
File Description: application/pdf
Relation: https://biblio.ugent.be/publication/01JJKHJFFTPZR7NGWHSXR46TR2; http://doi.org/10.1145/3689934.3690818; https://biblio.ugent.be/publication/01JJKHJFFTPZR7NGWHSXR46TR2/file/01JJKHN5RX1WACG346S405K2XX
-
3
Authors:
Source: Programming & Computer Software. Dec2019, Vol. 45 Issue 7, p381-389. 9p.
Subject Terms: *BINARY codes, *ALGORITHMS, *PARALLEL algorithms, *PARALLEL programming
-
4
Authors:
Source: Труды Института системного программирования РАН, Vol 30, Iss 2, Pp 25-44 (2018)
Subject Terms: параллельное программирование, распараллеливание программ, балансировка вычислительной нагрузки, Electronic computers. Computer science, QA75.5-76.95
File Description: electronic resource
-
5
Authors:
Source: Ninth International Conference on Computer Science & Information Technologies Revised Selected Papers; 2013, p1-6, 6p
-
6
Authors:
Source: Труды Института системного программирования РАН, Vol 22, Iss 0 (2018)
Subject Terms: запутывание потока управления, восстановление потока управления программы, Electronic computers. Computer science, QA75.5-76.95
File Description: electronic resource
-
7
Authors: et al.
Source: 2017 Zooming Innovation in Consumer Electronics International Conference (ZINC). :47-51
-
8
Authors:
Source: Journal of Computer Virology & Hacking Techniques; Dec2019, Vol. 15 Issue 4, p259-275, 17p
-
9
Authors: et al.
Source: Journal of Computer Virology & Hacking Techniques; May2016, Vol. 12 Issue 2, p69-100, 32p
-
10
Authors:
Source: Research in Attacks, Intrusions & Defenses 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings; 2015, p538-561, 24p
-
11
Authors:
Source: 2015 IEEE 1st International Workshop on Software Analytics (SWAN); 2015, p35-38, 4p
-
12
Authors: et al.
Source: Languages & Compilers for Parallel Computing: 27th International Workshop, LCPC 2014, Hillsboro, OR, USA, September 15-17, 2014, Revised Selected Papers; 2015, p351-366, 16p
-
13
-
14
Authors: et al.
Source: Frontiers of Information Technology & Electronic Engineering; Nov2014, Vol. 15 Issue 11, p943-983, 41p
-
15
Authors: Josse, Sébastien
Source: Journal in Computer Virology; Jun2007, Vol. 3 Issue 2, p113-123, 11p
-
16
Authors:
Source: Proceedings of the 29th Annual ACM Symposium on Applied Computing. :1731-1732
-
17
Authors: et al.
Contributors: et al.
File Description: application/pdf
-
18
Authors: Arthur Gibadullin
Resource Type: eBook.
Subjects: Artificial intelligence--Congresses, Decision making--Data processing--Congresses, Information technology--Congresses
Categories: COMPUTERS / Database Administration & Management, COMPUTERS / Image Processing, COMPUTERS / Artificial Intelligence / Computer Vision & Pattern Recognition, COMPUTERS / Networking / General, COMPUTERS / Software Development & Engineering / General, COMPUTERS / Hardware / General
-
19
Authors: et al.
Resource Type: eBook.
Subjects: Data protection, Cryptography, Data encryption (Computer science), Computer networks, Computers and civilization, Artificial intelligence
Categories: COMPUTERS / Security / General, COMPUTERS / Artificial Intelligence / General, COMPUTERS / Networking / General, COMPUTERS / Social Aspects, COMPUTERS / Security / Cryptography & Encryption
-
20
Authors:
Resource Type: eBook.
Subjects: Compilers (Computer programs), Computer programming, Software engineering, Operating systems (Computers), Algorithms
Categories: COMPUTERS / Programming / Compilers, COMPUTERS / Operating Systems / General, COMPUTERS / Programming / General, COMPUTERS / Software Development & Engineering / General, COMPUTERS / Programming / Algorithms
Nájsť tento článok vo Web of Science
Full Text Finder