Academic literature on the topic 'Executabel file formats'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Executabel file formats.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Executabel file formats"
Křoustek, Jakub, and Dusan Kolář. "Context parsing (not only) of the object-file-format description language." Computer Science and Information Systems 10, no. 4 (2013): 1673–701. http://dx.doi.org/10.2298/csis130120071k.
Full textLi, Yang, Ye Liang, and Jing Zhang Liang. "Applied-Information Technology with Trojan Horse Detection Method Based on C5.0 Decision Tree." Applied Mechanics and Materials 540 (April 2014): 439–42. http://dx.doi.org/10.4028/www.scientific.net/amm.540.439.
Full textГолембиовская, Оксана, Oksana Golembiovskaya, Александр Козачок, Aleksandr Kozachok, Минь Лай, and Min Lay. "Prototype of access controlled differentiation system to files of documentation formats." Bulletin of Bryansk state technical university 2015, no. 4 (December 30, 2015): 127–34. http://dx.doi.org/10.12737/17148.
Full textSmith, Mike L., Andrzej K. Oleś, and Wolfgang Huber. "Authoring Bioconductor workflows with BiocWorkflowTools." F1000Research 7 (April 6, 2018): 431. http://dx.doi.org/10.12688/f1000research.14399.1.
Full textEt. al., Balal Sohail. "Macro Based Malware Detection System." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 10, 2021): 5776–87. http://dx.doi.org/10.17762/turcomat.v12i3.2254.
Full textNa, Geonbae, Jongsu Lim, Sunjun Lee, and Jeong Hyun Yi. "Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART." Sensors 19, no. 11 (June 10, 2019): 2625. http://dx.doi.org/10.3390/s19112625.
Full textYehorov, Serhii, and Tetyana Shkvarnytska. "ADVANCED METHOD OF ANALYSIS OF MALICIOUS SOFTWARE FOR THE PURPOSE OF CREATING SIGNATURES." Visnyk Universytetu “Ukraina”, no. 1 (28) 2020 (2020): 161–70. http://dx.doi.org/10.36994/2707-4110-2020-1-28-14.
Full textBukhanov, D. G., V. M. Polyakov, and M. A. Redkina. "Detection of malware using an artificial neural network based on adaptive resonant theory." Prikladnaya Diskretnaya Matematika, no. 52 (2021): 69–82. http://dx.doi.org/10.17223/20710410/52/4.
Full textBai, Jinrong, Junfeng Wang, and Guozhong Zou. "A Malware Detection Scheme Based on Mining Format Information." Scientific World Journal 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/260905.
Full textTakefuji, Yoshiyasu. "Python Programming in PyPI for Translational Medicine." International Journal of Translational Medicine 1, no. 3 (November 24, 2021): 323–31. http://dx.doi.org/10.3390/ijtm1030019.
Full textDissertations / Theses on the topic "Executabel file formats"
Nisi, Dario. "Unveiling and mitigating common pitfalls in malware analysis." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS528.
Full textAs the importance of computer systems in modern-day societies grows, so does the damage that malicious software causes. The security industry and malware authors engaged in an arms race, in which the first creates better detection systems while the second try to evade them. In fact, any wrong assumption (no matter how subtle) in the design of an anti-malware tool may create new avenues for evading detection. This thesis focuses on two often overlooked aspects of modern malware analysis techniques: the use of API-level information to encode malicious behavior and the reimplementation of parsing routines for executable file formats in security-oriented tools. We show that taking advantage of these practices is possible on a large and automated scale. Moreover, we study the feasibility of fixing these problems at their roots, measuring the difficulties that anti-malware architects may encounter and providing strategies to solve them
Book chapters on the topic "Executabel file formats"
Palmskog, Karl, Ahmet Celik, and Milos Gligoric. "Practical Machine-Checked Formalization of Change Impact Analysis." In Tools and Algorithms for the Construction and Analysis of Systems, 137–57. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45237-7_9.
Full textConference papers on the topic "Executabel file formats"
Helmy, Samy A., Judith K. Guy-Caffey, Leroy J. Detiveaux, Sabine C. Zeilinger, Mike D. Barry, and Cliff Aaron Corbell. "The Successful Development, Validation, and First Use of an Innovative Zinc-Free, High-Density Completion Fluid for Deepwater." In SPE/IADC International Drilling Conference and Exhibition. SPE, 2021. http://dx.doi.org/10.2118/204095-ms.
Full textSalimov, Rail, Javier Torres, Yousif Al Katheeri, Yousef Alhammadi, and Ahmed Abdelrahman. "Automation of Formation Tops Estimation Dramatically Reduces Well Planning Process Duration." In SPE/IADC Middle East Drilling Technology Conference and Exhibition. SPE, 2021. http://dx.doi.org/10.2118/202139-ms.
Full text