Journal articles on the topic 'Control Flow Graph (CFG)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Control Flow Graph (CFG).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Koppel, James, Jackson Kearl, and Armando Solar-Lezama. "Automatically deriving control-flow graph generators from operational semantics." Proceedings of the ACM on Programming Languages 6, ICFP (2022): 742–71. http://dx.doi.org/10.1145/3547648.
Full textQiu, Dehong, Jialin Sun, and Hao Li. "Improving Similarity Measure for Java Programs Based on Optimal Matching of Control Flow Graphs." International Journal of Software Engineering and Knowledge Engineering 25, no. 07 (2015): 1171–97. http://dx.doi.org/10.1142/s0218194015500229.
Full textKapoor, Akshay, and Sunita Dhavale. "Control Flow Graph Based Multiclass Malware Detection Using Bi-normal Separation." Defence Science Journal 66, no. 2 (2016): 138. http://dx.doi.org/10.14429/dsj.66.9701.
Full textWANG, XUEXIANG, HANLAI PU, JUN YANG, and LONGXING SHI. "EXTENDED CONTROL FLOW GRAPH BASED PERFORMANCE AND ENERGY CONSUMPTION OPTIMIZATION USING SCRATCH-PAD MEMORY." Journal of Circuits, Systems and Computers 18, no. 04 (2009): 697–711. http://dx.doi.org/10.1142/s0218126609005204.
Full textWONG, W. ERIC, and YU LEI. "REACHABILITY GRAPH-BASED TEST SEQUENCE GENERATION FOR CONCURRENT PROGRAMS." International Journal of Software Engineering and Knowledge Engineering 18, no. 06 (2008): 803–22. http://dx.doi.org/10.1142/s0218194008003878.
Full textDong, Kwan Kim. "Enhancing code clone detection using control flow graphs." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 3804–12. https://doi.org/10.11591/ijece.v9i5.pp3804-3812.
Full textQiang, Weizhong, Shizhen Wang, Hai Jin, and Jiangying Zhong. "Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS." Security and Communication Networks 2018 (October 17, 2018): 1–11. http://dx.doi.org/10.1155/2018/3130652.
Full textGao, Hao, Tong Zhang, Songqiang Chen, Lina Wang, and Fajiang Yu. "FUSION: Measuring Binary Function Similarity with Code-Specific Embedding and Order-Sensitive GNN." Symmetry 14, no. 12 (2022): 2549. http://dx.doi.org/10.3390/sym14122549.
Full textStiawan, Deris, Somame Morianus Daely, Ahmad Heryanto, Nurul Afifah, Mohd Yazid Idris, and Rahmat Budiarto. "Ransomware Detection Based On Opcode Behavior Using K-Nearest Neighbors Algorithm." Information Technology and Control 50, no. 3 (2021): 495–506. http://dx.doi.org/10.5755/j01.itc.50.3.25816.
Full textPark, Jungsoo, and Souhwan Jung. "Android Adware Detection using Soot and CFG." Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 13, no. 4 (2022): 94–104. http://dx.doi.org/10.58346/jowua.2022.i4.006.
Full textYu, Zeping, Rui Cao, Qiyi Tang, Sen Nie, Junzhou Huang, and Shi Wu. "Order Matters: Semantic-Aware Neural Networks for Binary Code Similarity Detection." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 01 (2020): 1145–52. http://dx.doi.org/10.1609/aaai.v34i01.5466.
Full textM., Nandish, Jalesh Kumar, Mohan H. G., and Manjunath Sargur Krishnamurthy. "GraphConvDeep: A Deep Learning Approach for Enhancing Binary Code Similarity Detection using Graph Embeddings." International Journal of Computer Network and Information Security 17, no. 3 (2025): 72–88. https://doi.org/10.5815/ijcnis.2025.03.05.
Full textLiu, Guangming, Xin Zhou, Jianmin Pang, Feng Yue, Wenfu Liu, and Junchao Wang. "Codeformer: A GNN-Nested Transformer Model for Binary Code Similarity Detection." Electronics 12, no. 7 (2023): 1722. http://dx.doi.org/10.3390/electronics12071722.
Full textKim, Dong Kwan. "Enhancing code clone detection using control flow graphs." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 3804. http://dx.doi.org/10.11591/ijece.v9i5.pp3804-3812.
Full textAlthunibat, Ahmed, Mustafa Mahmood, Hend Alnuhait, Sally Almanasra, and Haneen A. Al-Khawaja. "Proposed Test Case Generation Model using Fuzzy Logic (TCGMFL)." WSEAS TRANSACTIONS ON COMPUTER RESEARCH 12 (November 22, 2023): 161–72. http://dx.doi.org/10.37394/232018.2024.12.16.
Full textTauner, Stefan, and Mario Telesklav. "Comparative Analysis and Enhancement of CFG-based Hardware-Assisted CFI Schemes." ACM Transactions on Embedded Computing Systems 20, no. 5s (2021): 1–25. http://dx.doi.org/10.1145/3476989.
Full textYang, Haixin, Zhen Li, and Xinyu Guo. "A Novel Source Code Clone Detection Method Based on Dual-GCN and IVHFS." Electronics 12, no. 6 (2023): 1315. http://dx.doi.org/10.3390/electronics12061315.
Full textLee, Sungbin, and Jeonghun Cho. "ACE-M: Automated Control Flow Integrity Enforcement Based on MPUs at the Function Level." Electronics 11, no. 6 (2022): 912. http://dx.doi.org/10.3390/electronics11060912.
Full textYang, Zhao Hong, Qing Xiao, Yun Zhan Gong, Da Hai Jin, and Ya Wen Wang. "The Research of an Abstract Semantic Framework for Defect Detecting." Advanced Materials Research 186 (January 2011): 536–40. http://dx.doi.org/10.4028/www.scientific.net/amr.186.536.
Full textKhoshavi, Navid, Hamid Zarandi, and Mohammad Maghsoudloo. "Two control-flow error recovery methods for multithreaded programs running on multi-core processors." Facta universitatis - series: Electronics and Energetics 28, no. 3 (2015): 309–23. http://dx.doi.org/10.2298/fuee1503309k.
Full textSetyawan, Moh Arsyad Mubarak, Fajar Pradana, and Bayu Priyambadha. "Pengembangan sistem otomatisasi pembangkitan kasus uji dengan algoritma genetika dan test case generation method." teknologi 10, no. 1 (2020): 1. http://dx.doi.org/10.26594/teknologi.v10i1.1912.
Full textLiu, Qiang, Wei Zhu, Feng Ma, Xiyu Jia, Yu Gao, and Jun Wen. "Graph attention network-based fluid simulation model." AIP Advances 12, no. 9 (2022): 095114. http://dx.doi.org/10.1063/5.0122165.
Full textZhao, Jingwen, Yanxia Wu, Yan Fu, and Shuyong Liu. "ESfix: An Embedded Program Repair Tool for Effective Removal of Concurrency Defects." Entropy 27, no. 3 (2025): 294. https://doi.org/10.3390/e27030294.
Full textWang, Zhongru, Yuntao Zhang, Zhihong Tian, et al. "Automated Vulnerability Discovery and Exploitation in the Internet of Things." Sensors 19, no. 15 (2019): 3362. http://dx.doi.org/10.3390/s19153362.
Full textGu, Zhenghua, Wenqing Wan, Jundong Xie, and Chang Wu. "Dependency Graph-based High-level Synthesis for Maximum Instruction Parallelism." ACM Transactions on Reconfigurable Technology and Systems 14, no. 4 (2021): 1–15. http://dx.doi.org/10.1145/3468875.
Full textKar, Santosh Kumar, Brojo Kishore Mishra, and Sanjit Kumar Acharya. "Refurbishment of object-oriented code: A methodical approach to minimize program complexity." Journal of Decision Analytics and Intelligent Computing 5, no. 1 (2025): 52–69. https://doi.org/10.31181/jdaic10018052025k.
Full textWasiur, Rhmann*1 Gufran Ansari2. "APPLICATION OF CLONAL SELECTION ALGORITHM IN SOFTWARE TEST DATA GENERATION." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 7 (2017): 452–59. https://doi.org/10.5281/zenodo.829221.
Full textXu, Luhang, Liangze Yin, Wei Dong, Weixi Jia, and Yongjun Li. "Expediting Binary Fuzzing with Symbolic Analysis." International Journal of Software Engineering and Knowledge Engineering 28, no. 11n12 (2018): 1701–18. http://dx.doi.org/10.1142/s0218194018400247.
Full textLiu, Chang Yun, Xue Zeng Zhao, and Fang Chen. "Application of Numerical Simulation in Analysis and Optimization of Constant Flux Blanking Plug." Materials Science Forum 532-533 (December 2006): 765–68. http://dx.doi.org/10.4028/www.scientific.net/msf.532-533.765.
Full textRiyadhthusollehan Khairulfuaad, Norzelawati Asmuin, Juntakan Taweekun, Azizan Ismail, and Nabil Izzuddin Shahhidan. "CFD Analysis for Valve-Holding Camber Permanent Inhaler Spacer (AerospaAcer) with Different Valves." CFD Letters 16, no. 6 (2024): 53–67. http://dx.doi.org/10.37934/cfdl.16.6.5367.
Full textChumpol, Surachate, Panadda Solod, Krerkchai Thongnoo, and Nattha Jindapetch. "Model-Based Design Optimization using CDFG for Image Processing on FPGA." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 17, no. 4 (2023): 479–87. http://dx.doi.org/10.37936/ecti-cit.2023174.252417.
Full textZivkovic, Vladimir, der van, Ed Deprettere, and Kock de. "A new approach for system-level architecture exploration." Facta universitatis - series: Electronics and Energetics 16, no. 1 (2003): 103–14. http://dx.doi.org/10.2298/fuee0301103z.
Full textFukuda, Kazumasa, and Haruaki Tamada. "To Prevent Reverse-Enginnering Tools by Shuffling the Stack Status with Hook Mechanism." International Journal of Software Innovation 3, no. 3 (2015): 14–25. http://dx.doi.org/10.4018/ijsi.2015070102.
Full textM, Thillai Rani, Rajkumar R, Sai Pradeep K.P, Jaishree M, and Rahul S.G. "Integrated extreme gradient boost with c4.5 classifier for high level synthesis in very large scale integration circuits." ITM Web of Conferences 56 (2023): 01005. http://dx.doi.org/10.1051/itmconf/20235601005.
Full textVershkov, V. A., B. S. Kritsky, and R. M. Mirgazov. "FEATURES OF MODELING THE FLOW AROUND THE HELICOPTER MAIN ROTOR TAKING INTO ACCOUNT ARBITRARY BLADES MOTION." Civil Aviation High TECHNOLOGIES 22, no. 3 (2019): 25–34. http://dx.doi.org/10.26467/2079-0619-2019-22-3-25-34.
Full textWang, Feng Qin, and Heng Jin Ke. "Control Flow Analyze for Procedure Blueprint." Applied Mechanics and Materials 58-60 (June 2011): 1061–66. http://dx.doi.org/10.4028/www.scientific.net/amm.58-60.1061.
Full textGan, Vincent J. L., Han Luo, Yi Tan, Min Deng, and H. L. Kwok. "BIM and Data-Driven Predictive Analysis of Optimum Thermal Comfort for Indoor Environment." Sensors 21, no. 13 (2021): 4401. http://dx.doi.org/10.3390/s21134401.
Full textJang, Hyerean, Moon Chan Park, and Dong Hoon Lee. "IBV-CFI: Efficient fine-grained control-flow integrity preserving CFG precision." Computers & Security 94 (July 2020): 101828. http://dx.doi.org/10.1016/j.cose.2020.101828.
Full textGautam, Pratiksha, and Hemraj Saini. "Non-Trivial Software Clone Detection Using Program Dependency Graph." International Journal of Open Source Software and Processes 8, no. 2 (2017): 1–24. http://dx.doi.org/10.4018/ijossp.2017040101.
Full textJin, Da Hai, Yun Zhan Gong, Zhao Hong Yang, Qing Xiao, and Chuan Chang Liu. "A Method of Software Static Testing in the Presence of Runtime Exception." Applied Mechanics and Materials 63-64 (June 2011): 789–94. http://dx.doi.org/10.4028/www.scientific.net/amm.63-64.789.
Full textXu, Pei, Yuxiang Lei, Yulei Sui, and Jingling Xue. "Iterative-Epoch Online Cycle Elimination for Context-Free Language Reachability." Proceedings of the ACM on Programming Languages 8, OOPSLA1 (2024): 1437–62. http://dx.doi.org/10.1145/3649862.
Full textRoghair, Ivo. "Advanced Numerical Tools for Chemical Process Intensification: Innovations in 3D Printing, Membrane Reactors, and Bubble Dynamics." Resúmenes de Mecánica Computacional 1, no. 3 (2024): 29. https://doi.org/10.70567/rmc.v1i3.146.
Full textBobrovnikova, Kira, Sergii Lysenko, Bohdan Savenko, Piotr Gaj, and Oleg Savenko. "Technique for IoT malware detection based on control flow graph analysis." RADIOELECTRONIC AND COMPUTER SYSTEMS, no. 1 (February 23, 2022): 141–53. http://dx.doi.org/10.32620/reks.2022.1.11.
Full textBuss, Armands, Arturs Suleiko, Normunds Jekabsons, Juris Vanags, and Dagnija Loca. "Constraint Handling and Flow Control in Stirred Tank Bioreactors with Magnetically Coupled Impellers." Materials Science Forum 1071 (October 18, 2022): 189–96. http://dx.doi.org/10.4028/p-w35yei.
Full textAlam, Shahid, Issa Traore, and Ibrahim Sogukpinar. "Annotated Control Flow Graph for Metamorphic Malware Detection." Computer Journal 58, no. 10 (2014): 2608–21. http://dx.doi.org/10.1093/comjnl/bxu148.
Full textConrado, Giovanna Kobus, Amir Kafshdar Goharshady, and Chun Kit Lam. "The Bounded Pathwidth of Control-Flow Graphs." Proceedings of the ACM on Programming Languages 7, OOPSLA2 (2023): 292–317. http://dx.doi.org/10.1145/3622807.
Full textShao, Jun Peng, Jian Ying Li, Zhong Wen Wang, and Gui Hua Han. "Research on Electro-Hydraulic Load Simulator Based on Building Model of Flow Press Servo Valve." Advanced Materials Research 129-131 (August 2010): 213–17. http://dx.doi.org/10.4028/www.scientific.net/amr.129-131.213.
Full textSen, A. K. "Metabolic control analysis. An application of signal flow graphs." Biochemical Journal 269, no. 1 (1990): 141–47. http://dx.doi.org/10.1042/bj2690141.
Full textRan, Longyan, Yunhe Cui, Jianpeng Zhao, and Hongzhen Yang. "TITAN: Combining a bidirectional forwarding graph and GCN to detect saturation attack targeted at SDN." PLOS ONE 19, no. 4 (2024): e0299846. http://dx.doi.org/10.1371/journal.pone.0299846.
Full textGao, Yun, Hirokazu Hasegawa, Yukiko Yamaguchi, and Hajime Shimada. "Malware Detection by Control-Flow Graph Level Representation Learning With Graph Isomorphism Network." IEEE Access 10 (2022): 111830–41. http://dx.doi.org/10.1109/access.2022.3215267.
Full text