Search Results - "binary code extraction"
-
1
Authors:
Source: International Journal on Software Tools for Technology Transfer. 25(2):167-184
File Description: electronic
-
2
Authors: et al.
Source: Lecture Notes in Computer Science ISBN: 9783319948201
-
3
Authors: et al.
Source: DTIC
Index Terms: Cybernetics, CODING, DATA PROCESSING SECURITY, EXTRACTION, IDENTIFICATION, CRYPTOGRAPHY, INTERFACES, BINARY CODES, REUTILIZATION, Text
-
4
Authors: et al.
Access URL: http://www.cs.berkeley.edu/%7Edawnsong/papers/2010%20binary%20code%20extraction.pdf
https://apps.dtic.mil/dtic/tr/fulltext/u2/a538737.pdf
http://bitblaze.cs.berkeley.edu/papers/bcr_ndss10.pdf
https://www.ndss-symposium.org/ndss2010/binary -code -extraction -and-interface-identification-security-applications
https://www.cs.berkeley.edu/~dawnsong/papers/2010%20binary%20code%20extraction.pdf
http://software.imdea.org/~juanca/papers/bcr_ndss10.pdf
https://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-133.pdf -
5
Authors:
Source: Tools and Algorithms for the Construction and Analysis of Systems, TACAS, Luxembourg City, Luxembourg Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 12652 LNCS:223-241
Subject Terms: linear propagation redundancy, binary code extraction
File Description: electronic
-
6
Authors: et al.
Contributors: et al.
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.173.8296; http://www.cs.berkeley.edu/%7Edawnsong/papers/2010%20binary%20code%20extraction.pdf
-
7
Authors: et al.
Contributors: et al.
File Description: application/pdf
-
8
Authors: et al.
Contributors: et al.
Source: DTIC
Subject Terms: Cybernetics, CODING, DATA PROCESSING SECURITY, EXTRACTION, IDENTIFICATION, CRYPTOGRAPHY, INTERFACES, BINARY CODES, REUTILIZATION
File Description: text/html
-
9
Authors:
Source: Journal of Sensor & Actuator Networks; Apr2025, Vol. 14 Issue 2, p35, 19p
Subject Terms: ARTIFICIAL intelligence, INTERNET of things, DATA integrity, INTERNET security, BLOCKCHAINS
-
10
Authors:
Source: Sensors (14248220); Aug2024, Vol. 24 Issue 15, p4805, 15p
Subject Terms: IRIS recognition, BIOMETRIC identification, COMPUTER vision, FEATURE extraction, DATABASES, HOUGH transforms
-
11
Authors: et al.
Source: Empirical Software Engineering; May2024, Vol. 29 Issue 3, p1-48, 48p
-
12
Authors:
Source: Journal of Optics (09728821); Apr2024, Vol. 53 Issue 2, p1186-1202, 17p
-
13
Authors: et al.
Source: International Journal of Software Engineering & Knowledge Engineering; Oct2023, Vol. 33 Issue 10, p1537-1565, 29p
Subject Terms: DATA recovery, REVERSE engineering, TASK analysis, RECURRENT neural networks
-
14
Authors:
Source: Concurrency & Computation: Practice & Experience; 2/28/2022, Vol. 34 Issue 5, p1-25, 25p
-
15
Authors:
Source: Lecture Notes in Computer Science ISBN: 9783030720124
Tools and Algorithms for the Construction and Analysis of SystemsSubject Terms: Article
Access URL: https://research.chalmers.se/publication/527500/file/527500_Fulltext.pdf
https://link.springer.com/content/pdf/10.1007%2F978-3-030-72013-1_12.pdf
https://link.springer.com/chapter/10.1007/978-3-030-72013-1_12
https://dblp.uni-trier.de/db/conf/tacas/tacas2021-2.html#TanHM21
https://rd.springer.com/chapter/10.1007/978-3-030-72013-1_12
https://link.springer.com/content/pdf/10.1007%2F978-3-030-72013-1_12.pdf
https://doi.org/10.1007/978-3-030-72013-1_12
https://europepmc.org/article/PMC/PMC7984575 -
16
Authors:
Source: Journal of Automation, Mobile Robotics & Intelligent Systems; 2019, Vol. 13 Issue 2, p15-22, 8p
Subject Terms: VISION testing, TEST systems, CAMERA calibration, ROBOTS, PINHOLE cameras
-
17
Authors: et al.
Source: Detection of Intrusions & Malware & Vulnerability Assessment (9783319406664); 2016, p186-206, 21p
-
18
Authors: et al.
Source: EURASIP Journal on Image & Video Processing; 2/21/2017, Vol. 2017 Issue 1, p1-11, 11p
Subject Terms: DEEP learning, HASHING, MOBILE apps, SMARTPHONES, BIT rate
-
19
Authors: et al.
Source: 2015 IEEE Symposium on Security & Privacy; 2015, p659-673, 15p
-
20
Authors:
Source: Proceedings of the European Conference on e-Learning (ECEL); 2015, p337-345, 9p
Full Text Finder
Nájsť tento článok vo Web of Science