Journal articles on the topic 'Executabel file formats'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 32 journal articles for your research on the topic 'Executabel file formats.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Křoustek, Jakub, and Dusan Kolář. "Context parsing (not only) of the object-file-format description language." Computer Science and Information Systems 10, no. 4 (2013): 1673–701. http://dx.doi.org/10.2298/csis130120071k.
Full textLi, Yang, Ye Liang, and Jing Zhang Liang. "Applied-Information Technology with Trojan Horse Detection Method Based on C5.0 Decision Tree." Applied Mechanics and Materials 540 (April 2014): 439–42. http://dx.doi.org/10.4028/www.scientific.net/amm.540.439.
Full textГолембиовская, Оксана, Oksana Golembiovskaya, Александр Козачок, Aleksandr Kozachok, Минь Лай, and Min Lay. "Prototype of access controlled differentiation system to files of documentation formats." Bulletin of Bryansk state technical university 2015, no. 4 (December 30, 2015): 127–34. http://dx.doi.org/10.12737/17148.
Full textSmith, Mike L., Andrzej K. Oleś, and Wolfgang Huber. "Authoring Bioconductor workflows with BiocWorkflowTools." F1000Research 7 (April 6, 2018): 431. http://dx.doi.org/10.12688/f1000research.14399.1.
Full textEt. al., Balal Sohail. "Macro Based Malware Detection System." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 10, 2021): 5776–87. http://dx.doi.org/10.17762/turcomat.v12i3.2254.
Full textNa, Geonbae, Jongsu Lim, Sunjun Lee, and Jeong Hyun Yi. "Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART." Sensors 19, no. 11 (June 10, 2019): 2625. http://dx.doi.org/10.3390/s19112625.
Full textYehorov, Serhii, and Tetyana Shkvarnytska. "ADVANCED METHOD OF ANALYSIS OF MALICIOUS SOFTWARE FOR THE PURPOSE OF CREATING SIGNATURES." Visnyk Universytetu “Ukraina”, no. 1 (28) 2020 (2020): 161–70. http://dx.doi.org/10.36994/2707-4110-2020-1-28-14.
Full textBukhanov, D. G., V. M. Polyakov, and M. A. Redkina. "Detection of malware using an artificial neural network based on adaptive resonant theory." Prikladnaya Diskretnaya Matematika, no. 52 (2021): 69–82. http://dx.doi.org/10.17223/20710410/52/4.
Full textBai, Jinrong, Junfeng Wang, and Guozhong Zou. "A Malware Detection Scheme Based on Mining Format Information." Scientific World Journal 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/260905.
Full textTakefuji, Yoshiyasu. "Python Programming in PyPI for Translational Medicine." International Journal of Translational Medicine 1, no. 3 (November 24, 2021): 323–31. http://dx.doi.org/10.3390/ijtm1030019.
Full textRosenberg, David M., and Charles C. Horn. "Neurophysiological analytics for all! Free open-source software tools for documenting, analyzing, visualizing, and sharing using electronic notebooks." Journal of Neurophysiology 116, no. 2 (August 1, 2016): 252–62. http://dx.doi.org/10.1152/jn.00137.2016.
Full textShim, Jaewoo, Kyeonghwan Lim, Seong-je Cho, Sangchul Han, and Minkyu Park. "Static and Dynamic Analysis of Android Malware and Goodware Written with Unity Framework." Security and Communication Networks 2018 (June 20, 2018): 1–12. http://dx.doi.org/10.1155/2018/6280768.
Full textKrawczyk, Artur, and Paweł Owsianka. "Using the Bentley MicroStation environment to program calculations of predicted ground subsidence caused by underground mining exploitation." E3S Web of Conferences 106 (2019): 01003. http://dx.doi.org/10.1051/e3sconf/201910601003.
Full textHandoko, Budhi, Yeny Krista Franty, and Gumgum Darmawan. "PEMBUATAN APLIKASI PRAKTIS DESAIN BLOK ACAK LENGKAP MENGGUNAKAN BAHASA PEMROGRAMAN LAZARUS." Jurnal Ilmiah Matematika dan Pendidikan Matematika 9, no. 1 (June 23, 2017): 23. http://dx.doi.org/10.20884/1.jmp.2017.9.1.2852.
Full textFinney, Richard P., Qing-Rong Chen, Cu V. Nguyen, Chih Hao Hsu, Chunhua Yan, Ying Hu, Massih Abawi, Xiaopeng Bian, and Daoud M. Meerzaman. "Alview: Portable Software for Viewing Sequence Reads in BAM Formatted Files." Cancer Informatics 14 (January 2015): CIN.S26470. http://dx.doi.org/10.4137/cin.s26470.
Full textHwang, Chanwoong, Junho Hwang, Jin Kwak, and Taejin Lee. "Platform-Independent Malware Analysis Applicable to Windows and Linux Environments." Electronics 9, no. 5 (May 12, 2020): 793. http://dx.doi.org/10.3390/electronics9050793.
Full textDemetrio, Luca, Scott E. Coull, Battista Biggio, Giovanni Lagorio, Alessandro Armando, and Fabio Roli. "Adversarial EXEmples." ACM Transactions on Privacy and Security 24, no. 4 (November 30, 2021): 1–31. http://dx.doi.org/10.1145/3473039.
Full textWang, Hang, Yunfeng Chen, Omar M. Saad, Wei Chen, Yapo Abolé Serge Innocent Oboué, Liuqing Yang, Sergey Fomel, and Yangkang Chen. "A MATLAB code package for 2D/3D local slope estimation and structural filtering." GEOPHYSICS 87, no. 3 (March 3, 2022): F1—F14. http://dx.doi.org/10.1190/geo2021-0266.1.
Full textARDELEAN, ADORIAN, KARINA KERVIN, SUMAN KANSAKAR, and DAPHNE GAIL FAUTIN. "Syngraph: An application for graphic display and interactive use of synonym lists." Zootaxa 2283, no. 1 (November 6, 2009): 29–39. http://dx.doi.org/10.11646/zootaxa.2283.1.3.
Full textWARD, MONICA. "Reusable XML technologies and the development of language learning materials." ReCALL 14, no. 2 (November 2002): 285–94. http://dx.doi.org/10.1017/s0958344002000629.
Full textAghamiri, Sara Sadat, Vidisha Singh, Aurélien Naldi, Tomáš Helikar, Sylvain Soliman, and Anna Niarakis. "Automated inference of Boolean models from molecular interaction maps using CaSQ." Bioinformatics 36, no. 16 (May 13, 2020): 4473–82. http://dx.doi.org/10.1093/bioinformatics/btaa484.
Full textColleter, Rozenn, Jean-Baptiste Romain, and Jean-Baptiste Barreau. "HumanOS: an open source nomadic software database for physical anthropology and archaeology." Virtual Archaeology Review 11, no. 23 (July 8, 2020): 94. http://dx.doi.org/10.4995/var.2020.13422.
Full textMadhusanka, Sajith, Anusha Walisadeera, Gilmini Dantanarayana, Jeevani Goonetillake, and Athula Ginige. "An Ontological Clinical Decision Support System Based on Clinical Guidelines for Diabetes Patients in Sri Lanka." Healthcare 8, no. 4 (December 18, 2020): 573. http://dx.doi.org/10.3390/healthcare8040573.
Full textShah, Syed Shakir Hameed, Abd Rahim Ahmad, Norziana Jamil, and Atta ur Rehman Khan. "Memory Forensics-Based Malware Detection Using Computer Vision and Machine Learning." Electronics 11, no. 16 (August 18, 2022): 2579. http://dx.doi.org/10.3390/electronics11162579.
Full textFriedenberg, Nicholas A. "EcologyEcological Models and Dynamics: An Interactive Textbook. By RogerSchmitz. New York: Garland Science. Taylor & Francis Group. $50.00 (CDROM and Booklet). CDROM Contents: Chapters 110 of Ecological Models and Dynamics in PowerPoint and PDF; Interactive PowerPoint, Mathcad, Acrobat, and Excel files and LabVIEW executables; LabVIEW runtime engine installer. Opens in PowerPoint and PDF format. 9780815344261. 2009." Quarterly Review of Biology 85, no. 3 (September 2010): 350. http://dx.doi.org/10.1086/655045.
Full textBender, Julian, and Carla Schmidt. "The CroCo cross-link converter: a user-centred tool to convert results from cross-linking mass spectrometry experiments." Bioinformatics, September 28, 2019. http://dx.doi.org/10.1093/bioinformatics/btz732.
Full textTian, Zuwei, and Hengfu Yang. "Code fusion information-hiding algorithm based on PE file function migration." EURASIP Journal on Image and Video Processing 2021, no. 1 (January 6, 2021). http://dx.doi.org/10.1186/s13640-020-00541-3.
Full textVences, Miguel, Patmanidis Stefanos, Vladimir Kharchev, and Susanne S. Renner. "Concatenator, a user-friendly program to concatenate DNA sequences, implementing graphical user interfaces for MAFFT and FastTree." Bioinformatics Advances, July 21, 2022. http://dx.doi.org/10.1093/bioadv/vbac050.
Full text"Predicting the Dynamic Behaviour of Malware using RNN." International Journal of Engineering and Advanced Technology 9, no. 3 (February 29, 2020): 3557–59. http://dx.doi.org/10.35940/ijeat.c6291.029320.
Full textVENCES, MIGUEL, AURÉLIEN MIRALLES, SOPHIE BROUILLET, JACQUES DUCASSE, ALEXANDER FEDOSOV, VLADIMIR KHARCHEV, IVAYLO KOSTADINOV, et al. "iTaxoTools 0.1: Kickstarting a specimen-based software toolkit for taxonomists." Megataxa 6, no. 2 (July 23, 2021). http://dx.doi.org/10.11646/megataxa.6.2.1.
Full text"Overview of static methods of analysis malicious software." Computer Science and Cybersecurity, no. 2 (2020). http://dx.doi.org/10.26565/2519-2310-2020-2-02.
Full textBolshakova, Natalia. "Electronic Library “Pskoviana” (structure, content, prospects of development)." Arts and Music in Cultural Discourse. Proceedings of the International Scientific and Practical Conference, September 28, 2013, 9. http://dx.doi.org/10.17770/amcd2013.1266.
Full text