Search Results - binary code
-
1
Authors: Mizuhito Ogawa
Source: Journal of Science and Technology on Information security. :3-18
-
2
Authors:
Source: Proceedings of the 2025 Workshop on Software Understanding and Reverse Engineering. :102-113
-
3
Authors:
Source: Programming & Computer Software. Dec2025, Vol. 51 Issue 6, p415-428. 14p.
Subject Terms: *BINARY codes, *ALGORITHMS, *ABSTRACTION (Computer science), *DATA flow computing, *SOFTWARE development tools
-
4
Authors:
Source: Advances in Mathematics of Communications. 19:1119-1136
Subject Terms: zero-divisor graph, Graphical indices (Wiener index, Zagreb index, Randić index, etc.), General commutative ring theory and combinatorics (zero-divisor graphs, annihilating-ideal graphs, etc.), Graphs and linear algebra (matrices, eigenvalues, etc.), binary generating code, topological indices, threshold graph, Graphs and abstract algebra (groups, rings, fields, etc.), energy
File Description: application/xml
-
5
Authors: et al.
Source: IEEE Transactions on Dependable and Secure Computing. 22:308-326
Subject Terms: FOS: Computer and information sciences, Computer Science - Machine Learning, Computer Science - Cryptography and Security, 0211 other engineering and technologies, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, Assembly, Task analysis, Vectors, Transformers, Semantics, Binary codes, Benchmark testing, 01 natural sciences, Cryptography and Security (cs.CR), 0105 earth and related environmental sciences, Machine Learning (cs.LG)
File Description: application/pdf
Access URL: http://arxiv.org/abs/2208.06692
-
6
Authors: et al.
Source: Proceedings of the ACM on Software Engineering. 2:1339-1362
-
7
Authors:
Source: Advances in Mathematics of Communications. 19:1260-1276
Subject Terms: BCH bound, cyclic code, linear code, Cyclic codes, binary code, Linear codes (general theory)
File Description: application/xml
-
8
Authors: et al.
Source: Proceedings of the ACM on Software Engineering. 2:1167-1189
-
9
Authors: et al.
Source: International Journal of Computer Network and Information Security. 17:72-88
-
10
Authors: et al.
Source: Proceedings of the ACM on Software Engineering. 2:801-824
Subject Terms: Software Engineering (cs.SE), FOS: Computer and information sciences, Cryptography and Security, Software Engineering, Cryptography and Security (cs.CR)
Access URL: http://arxiv.org/abs/2506.11612
-
11
Authors:
Source: Proceedings of the 20th ACM Asia Conference on Computer and Communications Security. :1724-1740
-
12
Authors:
Source: 2025 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO). :1-5
-
13
Authors: WEI Youyuan, SONG Jianhua, ZHANG Yan
Source: Jisuanji kexue, Vol 52, Iss 6, Pp 365-380 (2025)
Subject Terms: binary code similarity detection, code representation, software security, malicious code identification, vulnerability search, Computer software, QA76.75-76.765, Technology (General), T1-995
File Description: electronic resource
-
14
Authors:
Source: 2025 17th International Conference on Electronics, Computers and Artificial Intelligence (ECAI). :1-4
-
15
Authors: et al.
Source: 2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). :47-60
-
16
Authors:
Source: 2025 62nd ACM/IEEE Design Automation Conference (DAC). :1-7
-
17
Authors:
Source: ACS Synthetic Biology. 14:3348-3355
Access URL: https://pubmed.ncbi.nlm.nih.gov/40333022
-
18
Authors:
Contributors:
Source: urn:tid:203741420
Subject Terms: Verificação de Modelos, Vulnerabilidades de Overflow na Pilha, Código Binário, Execução Concólica, Análise Estática, Teses de mestrado - 2024
File Description: application/pdf
Availability: http://hdl.handle.net/10400.5/95544
-
19
Authors: et al.
Source: 2025 Design, Automation & Test in Europe Conference (DATE). :1-7
Subject Terms: Software Engineering (cs.SE), FOS: Computer and information sciences, Computer Science - Software Engineering, Computer Science - Cryptography and Security, Computer Science - Programming Languages, Cryptography and Security (cs.CR), Programming Languages (cs.PL)
Access URL: http://arxiv.org/abs/2404.04132
-
20
Authors: et al.
Source: Proceedings of the 18th European Workshop on Systems Security. :26-32
Subject Terms: FOS: Computer and information sciences, Computer Science - Machine Learning, Computer Science - Cryptography and Security, Artificial Intelligence (cs.AI), Computer Science - Artificial Intelligence, Cryptography and Security (cs.CR), Machine Learning (cs.LG)
Access URL: http://arxiv.org/abs/2412.07538
Nájsť tento článok vo Web of Science
Full Text Finder