Journal articles on the topic 'Decompiler'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 31 journal articles for your research on the topic 'Decompiler.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Gusarovs, Konstantins. "An Analysis on Java Programming Language Decompiler Capabilities." Applied Computer Systems 23, no. 2 (December 1, 2018): 109–17. http://dx.doi.org/10.2478/acss-2018-0014.
Full textMikhailov, A. A., and A. E. Hmelnov. "Delphi object files decompiler." Proceedings of the Institute for System Programming of the RAS 29, no. 6 (2017): 105–16. http://dx.doi.org/10.15514/ispras-2017-29(6)-5.
Full textMihajlenko, Kristina, Mikhail Lukin, and Andrey Stankevich. "A method for decompilation of AMD GCN kernels to OpenCL." Information and Control Systems, no. 2 (April 29, 2021): 33–42. http://dx.doi.org/10.31799/1684-8853-2021-2-33-42.
Full textLi, Zhiming, Qing Wu, and Kun Qian. "Adabot: Fault-Tolerant Java Decompiler (Student Abstract)." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 10 (April 3, 2020): 13861–62. http://dx.doi.org/10.1609/aaai.v34i10.7203.
Full textHarrand, Nicolas, César Soto-Valero, Martin Monperrus, and Benoit Baudry. "Java decompiler diversity and its application to meta-decompilation." Journal of Systems and Software 168 (October 2020): 110645. http://dx.doi.org/10.1016/j.jss.2020.110645.
Full textChen, Gengbiao, Zhengwei Qi, Shiqiu Huang, Kangqi Ni, Yudi Zheng, Walter Binder, and Haibing Guan. "A refined decompiler to generate C code with high readability." Software: Practice and Experience 43, no. 11 (July 13, 2012): 1337–58. http://dx.doi.org/10.1002/spe.2138.
Full textKřoustek, Jakub, Fridolín Pokorný, and Dusan Kolář. "A new approach to instruction-idioms detection in a retargetable decompiler." Computer Science and Information Systems 11, no. 4 (2014): 1337–59. http://dx.doi.org/10.2298/csis131203076k.
Full textQasim, Syed Ali, Jared M. Smith, and Irfan Ahmed. "Control Logic Forensics Framework using Built-in Decompiler of Engineering Software in Industrial Control Systems." Forensic Science International: Digital Investigation 33 (July 2020): 301013. http://dx.doi.org/10.1016/j.fsidi.2020.301013.
Full textKřoustek, Jakub, and Dusan Kolář. "Context parsing (not only) of the object-file-format description language." Computer Science and Information Systems 10, no. 4 (2013): 1673–701. http://dx.doi.org/10.2298/csis130120071k.
Full textYang, Pin, Huiyu Zhou, Yue Zhu, Liang Liu, and Lei Zhang. "Malware Classification Based on Shallow Neural Network." Future Internet 12, no. 12 (December 2, 2020): 219. http://dx.doi.org/10.3390/fi12120219.
Full textMateless, Roni, Daniel Rejabek, Oded Margalit, and Robert Moskovitch. "Decompiled APK based malicious code classification." Future Generation Computer Systems 110 (September 2020): 135–47. http://dx.doi.org/10.1016/j.future.2020.03.052.
Full textDu, Yao, Mengtian Cui, and Xiaochun Cheng. "A Mobile Malware Detection Method Based on Malicious Subgraphs Mining." Security and Communication Networks 2021 (April 17, 2021): 1–11. http://dx.doi.org/10.1155/2021/5593178.
Full textCen, Lei, Christoher S. Gates, Luo Si, and Ninghui Li. "A Probabilistic Discriminative Model for Android Malware Detection with Decompiled Source Code." IEEE Transactions on Dependable and Secure Computing 12, no. 4 (July 1, 2015): 400–412. http://dx.doi.org/10.1109/tdsc.2014.2355839.
Full textGuan, Jun, Huiying Liu, Baolei Mao, and Xu Jiang. "Android Malware Detection Based on API Pairing." Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 38, no. 5 (October 2020): 965–70. http://dx.doi.org/10.1051/jnwpu/20203850965.
Full textEscalada, Javier, Francisco Ortin, and Ted Scully. "An Efficient Platform for the Automatic Extraction of Patterns in Native Code." Scientific Programming 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/3273891.
Full textZhao, Xiao Lin, Gang Hao, Chang Zhen Hu, and Zhi Qiang Li. "A Discovery Method of the Dirty Data Transmission Path Based on Complex Network." Applied Mechanics and Materials 651-653 (September 2014): 1741–47. http://dx.doi.org/10.4028/www.scientific.net/amm.651-653.1741.
Full textChen, Tieming, Qingyu Mao, Yimin Yang, Mingqi Lv, and Jianming Zhu. "TinyDroid: A Lightweight and Efficient Model for Android Malware Detection and Classification." Mobile Information Systems 2018 (October 17, 2018): 1–9. http://dx.doi.org/10.1155/2018/4157156.
Full textMu, Zhiying, Zhihu Li, and Xiaoyu Li. "Structural similarity based common library detection method for Android." Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 39, no. 2 (April 2021): 448–53. http://dx.doi.org/10.1051/jnwpu/20213920448.
Full textTýma, Paul. "Transient Variable Caching in Java’s Stack-Based Intermediate Representation." Scientific Programming 7, no. 2 (1999): 157–66. http://dx.doi.org/10.1155/1999/501879.
Full textYang, Yang, Xuehui Du, Zhi Yang, and Xing Liu. "Android Malware Detection Based on Structural Features of the Function Call Graph." Electronics 10, no. 2 (January 15, 2021): 186. http://dx.doi.org/10.3390/electronics10020186.
Full textYan, Jinpei, Yong Qi, and Qifan Rao. "LSTM-Based Hierarchical Denoising Network for Android Malware Detection." Security and Communication Networks 2018 (2018): 1–18. http://dx.doi.org/10.1155/2018/5249190.
Full textMakaryan, Aleksandr, and Mikhail Karmanov. "Aspects of Analyzing the Security and Vulnerabilities of Mobile Applications." NBI Technologies, no. 1 (August 2018): 30–33. http://dx.doi.org/10.15688/nbit.jvolsu.2018.1.5.
Full textBodei, Chiara, Lorenzo Ceragioli, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Flaminia Luccio, Mauro Tempesta, and Lorenzo Veronese. "FWS: Analyzing, maintaining and transcompiling firewalls." Journal of Computer Security 29, no. 1 (February 3, 2021): 77–134. http://dx.doi.org/10.3233/jcs-200017.
Full textPicot, Jo, Vicky Copley, Jill L. Colquitt, Neelam Kalita, Debbie Hartwell, and Jackie Bryant. "The INTRABEAM® Photon Radiotherapy System for the adjuvant treatment of early breast cancer: a systematic review and economic evaluation." Health Technology Assessment 19, no. 69 (August 2015): 1–190. http://dx.doi.org/10.3310/hta19690.
Full textLiang, Ruigang, Ying Cao, Peiwei Hu, and Kai Chen. "Neutron: an attention-based neural decompiler." Cybersecurity 4, no. 1 (March 5, 2021). http://dx.doi.org/10.1186/s42400-021-00070-0.
Full textAger, Mads Sig, Olivier Danvy, and Mayer Goldberg. "A Symmetric Approach to Compilation and Decompilation." BRICS Report Series 9, no. 37 (August 5, 2002). http://dx.doi.org/10.7146/brics.v9i37.21752.
Full text"Decompile: automatic knowledge acquisition from concurrent reports using production system architectures." Knowledge-Based Systems 3, no. 2 (June 1990): 125. http://dx.doi.org/10.1016/0950-7051(90)90014-9.
Full textNghi Phu, Tran, Nguyen Dai Tho, Le Huy Hoang, Nguyen Ngoc Toan, and Nguyen Ngoc Binh. "An Efficient Algorithm to Extract Control Flow-Based Features for IoT Malware Detection." Computer Journal, October 28, 2020. http://dx.doi.org/10.1093/comjnl/bxaa087.
Full textBaguna, Nabella L., Sifrid S. Pangemanan, and Treesje Runtu. "ANALISIS PERHITUNGAN DAN PELAPORAN PAJAK PENGHASILAN PASAL 21 PEGAWAI TETAP PADA PT. BANK RAKYAT INDONESIA KANTOR." GOING CONCERN : JURNAL RISET AKUNTANSI 12, no. 2 (November 29, 2017). http://dx.doi.org/10.32400/gc.12.2.17685.2017.
Full textRizqony, Yusril Izza, Denar Regata Akbi, and Fauzi Dwi Sumadi Setiawan. "Analisis Karakteristik Malware Joker Berdasarkan Fitur Menggunakan Metode Statik Pada Platform Android." Jurnal Repositor 2, no. 10 (September 21, 2020). http://dx.doi.org/10.22219/repositor.v2i10.1145.
Full textZhu, Jie, Thanjai Vadivel, and C. B. Sivaparthipan. "Bigdata Assisted Energy Conversion Model for Innovative City Application." Journal of Interconnection Networks, August 4, 2021, 2141008. http://dx.doi.org/10.1142/s0219265921410085.
Full text