Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Function calls sequence“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Function calls sequence" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Function calls sequence"
Wang, Rongcun, Rubing Huang, Yansheng Lu und Binbin Qu. „Clustering Analysis of Function Call Sequence for Regression Test Case Reduction“. International Journal of Software Engineering and Knowledge Engineering 24, Nr. 08 (Oktober 2014): 1197–223. http://dx.doi.org/10.1142/s0218194014500387.
Der volle Inhalt der QuelleFleury, Cécile, Jérôme Gracy, Marie-Françoise Gautier, Jean-Luc Pons, Jean-François Dufayard, Gilles Labesse, Manuel Ruiz und Frédéric de Lamotte. „Comprehensive classification of the plant non-specific lipid transfer protein superfamily towards its sequence–structure–function analysis“. PeerJ 7 (14.08.2019): e7504. http://dx.doi.org/10.7717/peerj.7504.
Der volle Inhalt der QuelleZhang, Bing, Chun Shan, Munawar Hussain, Jiadong Ren und Guoyan Huang. „Software Crucial Functions Ranking and Detection in Dynamic Execution Sequence Patterns“. International Journal of Software Engineering and Knowledge Engineering 30, Nr. 05 (Mai 2020): 695–719. http://dx.doi.org/10.1142/s0218194020500254.
Der volle Inhalt der QuelleSievert, Volker, Sylvia Kuhn, Achim Paululat und Walther Traut. „Sequence conservation and expression of the Sex-lethal homologue in the fly Megaselia scalaris“. Genome 43, Nr. 2 (15.03.2000): 382–90. http://dx.doi.org/10.1139/g99-132.
Der volle Inhalt der QuelleHansen, Per Krogh. „Tiden ødelægger alt. Om episodisk bagvendte fortællinger illustreret ved hjælp af Gaspar Noés Irréversible“. K&K - Kultur og Klasse 39, Nr. 112 (25.12.2011): 93–106. http://dx.doi.org/10.7146/kok.v39i112.15746.
Der volle Inhalt der QuelleNissen, P. E., J. Christensen-Dalsgaard, J. R. Mosumgaard, V. Silva Aguirre, E. Spitoni und K. Verma. „High-precision abundances of elements in solar-type stars“. Astronomy & Astrophysics 640 (August 2020): A81. http://dx.doi.org/10.1051/0004-6361/202038300.
Der volle Inhalt der QuelleNie, Dan, und Yu Hui Wang. „Taint Graph of System Call Arguments for Intrusion Detection in Mobile Intelatrac“. Advanced Materials Research 546-547 (Juli 2012): 1101–6. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1101.
Der volle Inhalt der QuelleChen, Hui, Zhengqiang Li, Qingshan Jiang, Abdur Rasool und Lifei Chen. „A Hierarchical Approach for Android Malware Detection Using Authorization-Sensitive Features“. Electronics 10, Nr. 4 (10.02.2021): 432. http://dx.doi.org/10.3390/electronics10040432.
Der volle Inhalt der QuelleHan, Yongman, Jongcheon Choi, Seong-Je Cho, Haeyoung Yoo, Jinwoon Woo, Yunmook Nah und Minkyu Park. „A new detection scheme of software copyright infringement using software birthmark on windows systems“. Computer Science and Information Systems 11, Nr. 3 (2014): 1055–69. http://dx.doi.org/10.2298/csis130918064h.
Der volle Inhalt der QuelleYelensky, Roman, Kai Wang, Snjezana Dogan, Laetitia Borsu, Garrett Frampton, Doron Lipson, Philip Stephens et al. „Next-generation sequencing of FFPE solid tumor specimens for clinical use.“ Journal of Clinical Oncology 30, Nr. 15_suppl (20.05.2012): 10524. http://dx.doi.org/10.1200/jco.2012.30.15_suppl.10524.
Der volle Inhalt der QuelleDissertationen zum Thema "Function calls sequence"
Harmim, Dominik. „Pokročilá statická analýza atomičnosti v paralelních programech v prostředí Facebook Infer“. Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445592.
Der volle Inhalt der QuelleTseng, Chun-han, und 曾俊翰. „Intrusion Detection Using Function-based Sequences of System Calls“. Thesis, 2008. http://ndltd.ncl.edu.tw/handle/9u5t6d.
Der volle Inhalt der Quelle國立中央大學
資訊工程研究所
96
Computer and network security problems cause billions in damage every year. As the use of Internet, modern computer systems are plagued from security vulnerabilities. Security issues have become more and more important in such environment. Although the concept of buffer overflows had been known for years, modern computer systems suffered from these kinds of security weaknesses constantly. This article presents an improved method for intrusion detection, which detect abnormal behaviors of a process using function-based sequences of system calls. The method is especially effective in detecting Buffer Overflow Attacks. Our method also stored these sequences through a data structure called Suffix Tree, which improved our system performance a lot. Experiments show that our method has better effectiveness and performance than previous methods.
Bücher zum Thema "Function calls sequence"
Milstein, Sara J. Making a Case. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780190911805.001.0001.
Der volle Inhalt der QuelleBuchteile zum Thema "Function calls sequence"
Ariola, Zena M., Paul Downen, Hugo Herbelin, Keiko Nakata und Alexis Saurin. „Classical Call-by-Need Sequent Calculi: The Unity of Semantic Artifacts“. In Functional and Logic Programming, 32–46. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29822-6_6.
Der volle Inhalt der QuelleCui, Zhanqi, Xiang Chen, Yongmin Mu, Zhihua Zhang und Xu Ma. „Mining Function Call Sequence Patterns Across Different Versions of the Project for Defect Detection“. In Software Analysis, Testing, and Evolution, 154–69. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04272-1_10.
Der volle Inhalt der QuelleBailey, Timothy L. „MEME, MAST, and Meta-MEME: New Tools for Motif Discovery in Protein Sequences“. In Pattern Discovery in Biomolecular Data. Oxford University Press, 1999. http://dx.doi.org/10.1093/oso/9780195119404.003.0008.
Der volle Inhalt der QuelleBauer, Thomas, und Robert Eschbach. „Model-Based Testing of Distributed Functions“. In Advanced Automated Software Testing, 151–81. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0089-8.ch008.
Der volle Inhalt der QuelleSmullyan, Raymond M. „Indexing“. In Recursion Theory for Metamathematics. Oxford University Press, 1993. http://dx.doi.org/10.1093/oso/9780195082326.003.0007.
Der volle Inhalt der QuelleO’Leary, Jared. „Coding “Hip Hot Cross Buns” with Sonic Pi (Beginner)“. In The Music Technology Cookbook, 301–10. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780197523889.003.0050.
Der volle Inhalt der QuellePatel, Bhaskar N., und S. G. Prajapati. „Performance Comparison of AODV and DSDV Routing Protocols of MANET“. In Technological Advancements and Applications in Mobile Ad-Hoc Networks, 144–51. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0321-9.ch008.
Der volle Inhalt der QuelleSánchez-Pozos, Katy, María de los Ángeles Granados-Silvestre und María Guadalupe Ortíz-López. „From Pharmacogenetics to Gene Expression: Implications for Precision Medicine in Diabetes“. In Drug Metabolism [Working Title]. IntechOpen, 2021. http://dx.doi.org/10.5772/intechopen.97375.
Der volle Inhalt der QuelleGaines, Susan M., Geoffrey Eglinton und Jürgen Rullkötter. „Molecular Paleontology and Biochemical Evolution“. In Echoes of Life. Oxford University Press, 2008. http://dx.doi.org/10.1093/oso/9780195176193.003.0015.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Function calls sequence"
Gorji, Alireza, und Mahdi Abadi. „Detecting Obfuscated JavaScript Malware Using Sequences of Internal Function Calls“. In the 2014 ACM Southeast Regional Conference. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2638404.2737181.
Der volle Inhalt der QuelleKawasoe, Reo, Chansu Han, Ryoichi Isawa, Takeshi Takahashi und Jun'ichi Takeuchi. „Investigating behavioral differences between IoT malware via function call sequence graphs“. In SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3412841.3442041.
Der volle Inhalt der QuelleDitu, Bogdan. „Model-Based Function Call Code Generation and Stack Management in Retargetable Compilers: Application Binary Interface Modeling of Stack Layout and Function Call Sequence“. In 2015 20th International Conference on Control Systems and Computer Science (CSCS). IEEE, 2015. http://dx.doi.org/10.1109/cscs.2015.38.
Der volle Inhalt der QuelleKim, Myoung Yee, und Yoonsik Cheon. „A Fitness Function to Find Feasible Sequences of Method Calls for Evolutionary Testing of Object-Oriented Programs“. In 2008 International Conference on Software Testing, Verification, and Validation. IEEE, 2008. http://dx.doi.org/10.1109/icst.2008.31.
Der volle Inhalt der QuelleWang, Nanxin, und Jie Cheng. „EMAT: An Engineering Methodology Application Tool“. In ASME 1995 15th International Computers in Engineering Conference and the ASME 1995 9th Annual Engineering Database Symposium collocated with the ASME 1995 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1995. http://dx.doi.org/10.1115/cie1995-0730.
Der volle Inhalt der QuelleCipollone, Roberto, Davide Di Battista und Angelo Gualtieri. „Energy Recovery From the Turbocharging System of Internal Combustion Engines“. In ASME 2012 11th Biennial Conference on Engineering Systems Design and Analysis. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/esda2012-82302.
Der volle Inhalt der Quelle