Zobrazeno 1 - 10
of 705
pro vyhledávání: '"Binary Analysis"'
Publikováno v:
IEEE Access, Vol 12, Pp 161247-161269 (2024)
Binary analysis has become essential for software inspection and security assessment. As the number of software-driven devices grows, research is shifting towards autonomous solutions using deep learning models. In this context, a hot topic is the bi
Externí odkaz:
https://doaj.org/article/45c012a5175e42cea9e54af0608bbb25
Publikováno v:
IEEE Access, Vol 12, Pp 34477-34488 (2024)
Bit-stream recognition (BSR) has a wide range of applications, including forensic investigations, detecting copyright infringement, and analyzing malware. In order to analyze file fragments recovered by digital forensics, it is necessary to use a BSR
Externí odkaz:
https://doaj.org/article/4a2e4f2fb9664bb9af04afc1b6dbbce6
Publikováno v:
IEEE Access, Vol 12, Pp 12667-12682 (2024)
Identifying compiler toolchain provenance serves as a basis for both benign and malicious binary analyses. A wealth of prior studies mostly focuses on the inference of a popular compiler toolchain for C and C++ languages from stripped binaries that a
Externí odkaz:
https://doaj.org/article/182b526ec1c343c280daefd91bde5073
Autor:
Zhengtao He
Publikováno v:
International Journal of Agricultural Sustainability, Vol 21, Iss 1 (2023)
ABSTRACTThe emission of greenhouse gases is one of the main reasons for climate change, which comes from partially the agricultural production activities, especially livestock and poultry-scale breeding. Massive breeding of livestock and poultry can
Externí odkaz:
https://doaj.org/article/d3f79d34be774faaa2baa1a65d6e3812
Autor:
Bockenek, Joshua Alexander
Formal characterization of the memory used by a program is an important basis for security analyses, compositional verification, and identification of noninterference. However, soundly proving memory usage requires operating on the assembly level due
Externí odkaz:
http://hdl.handle.net/10919/114054
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Tehnički Vjesnik, Vol 29, Iss 1, Pp 221-230 (2022)
Today, computer systems are widely and importantly used throughout society, and malicious codes to take over the system and perform malicious actions are continuously being created and developed. These malicious codes are sometimes found in new forms
Externí odkaz:
https://doaj.org/article/e6990d0517b54b6f920b5bc0f73e31b4
Publikováno v:
HortScience, Vol 57, Iss 3, Pp 391-399 (2022)
‘Honeycrisp’ is a popular apple cultivar, but it is prone to several disorders, especially bitter pit. Previously reported models for predicting bitter pit are biased, indicating that the models are missing one or more important predictor variabl
Externí odkaz:
https://doaj.org/article/58519a84ab7a44f5a8292946cb8af041
Publikováno v:
IEEE Access, Vol 10, Pp 31626-31640 (2022)
Data dependence analysis is a must-do operation for parallelisation since it reveals the safe parallelisable regions of serial codes. Generally, it relies on dynamic analysis, which incurs substantial execution time and memory space overheads. As a r
Externí odkaz:
https://doaj.org/article/c4c5791943904dbba85ca6c20a23c1b4
Publikováno v:
Journal of Environmental Management and Tourism (JEMT). XII(7(55)):1788-1795
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=1022051