Articoli di riviste sul tema "Decompiler"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-31 articoli di riviste per l'attività di ricerca sul tema "Decompiler".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Gusarovs, Konstantins. "An Analysis on Java Programming Language Decompiler Capabilities". Applied Computer Systems 23, n. 2 (1 dicembre 2018): 109–17. http://dx.doi.org/10.2478/acss-2018-0014.
Testo completoMikhailov, A. A., e A. E. Hmelnov. "Delphi object files decompiler". Proceedings of the Institute for System Programming of the RAS 29, n. 6 (2017): 105–16. http://dx.doi.org/10.15514/ispras-2017-29(6)-5.
Testo completoMihajlenko, Kristina, Mikhail Lukin e Andrey Stankevich. "A method for decompilation of AMD GCN kernels to OpenCL". Information and Control Systems, n. 2 (29 aprile 2021): 33–42. http://dx.doi.org/10.31799/1684-8853-2021-2-33-42.
Testo completoLi, Zhiming, Qing Wu e Kun Qian. "Adabot: Fault-Tolerant Java Decompiler (Student Abstract)". Proceedings of the AAAI Conference on Artificial Intelligence 34, n. 10 (3 aprile 2020): 13861–62. http://dx.doi.org/10.1609/aaai.v34i10.7203.
Testo completoHarrand, Nicolas, César Soto-Valero, Martin Monperrus e Benoit Baudry. "Java decompiler diversity and its application to meta-decompilation". Journal of Systems and Software 168 (ottobre 2020): 110645. http://dx.doi.org/10.1016/j.jss.2020.110645.
Testo completoChen, Gengbiao, Zhengwei Qi, Shiqiu Huang, Kangqi Ni, Yudi Zheng, Walter Binder e Haibing Guan. "A refined decompiler to generate C code with high readability". Software: Practice and Experience 43, n. 11 (13 luglio 2012): 1337–58. http://dx.doi.org/10.1002/spe.2138.
Testo completoKřoustek, Jakub, Fridolín Pokorný e Dusan Kolář. "A new approach to instruction-idioms detection in a retargetable decompiler". Computer Science and Information Systems 11, n. 4 (2014): 1337–59. http://dx.doi.org/10.2298/csis131203076k.
Testo completoQasim, Syed Ali, Jared M. Smith e Irfan Ahmed. "Control Logic Forensics Framework using Built-in Decompiler of Engineering Software in Industrial Control Systems". Forensic Science International: Digital Investigation 33 (luglio 2020): 301013. http://dx.doi.org/10.1016/j.fsidi.2020.301013.
Testo completoKřoustek, Jakub, e Dusan Kolář. "Context parsing (not only) of the object-file-format description language". Computer Science and Information Systems 10, n. 4 (2013): 1673–701. http://dx.doi.org/10.2298/csis130120071k.
Testo completoYang, Pin, Huiyu Zhou, Yue Zhu, Liang Liu e Lei Zhang. "Malware Classification Based on Shallow Neural Network". Future Internet 12, n. 12 (2 dicembre 2020): 219. http://dx.doi.org/10.3390/fi12120219.
Testo completoMateless, Roni, Daniel Rejabek, Oded Margalit e Robert Moskovitch. "Decompiled APK based malicious code classification". Future Generation Computer Systems 110 (settembre 2020): 135–47. http://dx.doi.org/10.1016/j.future.2020.03.052.
Testo completoDu, Yao, Mengtian Cui e Xiaochun Cheng. "A Mobile Malware Detection Method Based on Malicious Subgraphs Mining". Security and Communication Networks 2021 (17 aprile 2021): 1–11. http://dx.doi.org/10.1155/2021/5593178.
Testo completoCen, Lei, Christoher S. Gates, Luo Si e Ninghui Li. "A Probabilistic Discriminative Model for Android Malware Detection with Decompiled Source Code". IEEE Transactions on Dependable and Secure Computing 12, n. 4 (1 luglio 2015): 400–412. http://dx.doi.org/10.1109/tdsc.2014.2355839.
Testo completoGuan, Jun, Huiying Liu, Baolei Mao e Xu Jiang. "Android Malware Detection Based on API Pairing". Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 38, n. 5 (ottobre 2020): 965–70. http://dx.doi.org/10.1051/jnwpu/20203850965.
Testo completoEscalada, Javier, Francisco Ortin e Ted Scully. "An Efficient Platform for the Automatic Extraction of Patterns in Native Code". Scientific Programming 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/3273891.
Testo completoZhao, Xiao Lin, Gang Hao, Chang Zhen Hu e Zhi Qiang Li. "A Discovery Method of the Dirty Data Transmission Path Based on Complex Network". Applied Mechanics and Materials 651-653 (settembre 2014): 1741–47. http://dx.doi.org/10.4028/www.scientific.net/amm.651-653.1741.
Testo completoChen, Tieming, Qingyu Mao, Yimin Yang, Mingqi Lv e Jianming Zhu. "TinyDroid: A Lightweight and Efficient Model for Android Malware Detection and Classification". Mobile Information Systems 2018 (17 ottobre 2018): 1–9. http://dx.doi.org/10.1155/2018/4157156.
Testo completoMu, Zhiying, Zhihu Li e Xiaoyu Li. "Structural similarity based common library detection method for Android". Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 39, n. 2 (aprile 2021): 448–53. http://dx.doi.org/10.1051/jnwpu/20213920448.
Testo completoTýma, Paul. "Transient Variable Caching in Java’s Stack-Based Intermediate Representation". Scientific Programming 7, n. 2 (1999): 157–66. http://dx.doi.org/10.1155/1999/501879.
Testo completoYang, Yang, Xuehui Du, Zhi Yang e Xing Liu. "Android Malware Detection Based on Structural Features of the Function Call Graph". Electronics 10, n. 2 (15 gennaio 2021): 186. http://dx.doi.org/10.3390/electronics10020186.
Testo completoYan, Jinpei, Yong Qi e Qifan Rao. "LSTM-Based Hierarchical Denoising Network for Android Malware Detection". Security and Communication Networks 2018 (2018): 1–18. http://dx.doi.org/10.1155/2018/5249190.
Testo completoMakaryan, Aleksandr, e Mikhail Karmanov. "Aspects of Analyzing the Security and Vulnerabilities of Mobile Applications". NBI Technologies, n. 1 (agosto 2018): 30–33. http://dx.doi.org/10.15688/nbit.jvolsu.2018.1.5.
Testo completoBodei, Chiara, Lorenzo Ceragioli, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Flaminia Luccio, Mauro Tempesta e Lorenzo Veronese. "FWS: Analyzing, maintaining and transcompiling firewalls". Journal of Computer Security 29, n. 1 (3 febbraio 2021): 77–134. http://dx.doi.org/10.3233/jcs-200017.
Testo completoPicot, Jo, Vicky Copley, Jill L. Colquitt, Neelam Kalita, Debbie Hartwell e Jackie Bryant. "The INTRABEAM® Photon Radiotherapy System for the adjuvant treatment of early breast cancer: a systematic review and economic evaluation". Health Technology Assessment 19, n. 69 (agosto 2015): 1–190. http://dx.doi.org/10.3310/hta19690.
Testo completoLiang, Ruigang, Ying Cao, Peiwei Hu e Kai Chen. "Neutron: an attention-based neural decompiler". Cybersecurity 4, n. 1 (5 marzo 2021). http://dx.doi.org/10.1186/s42400-021-00070-0.
Testo completoAger, Mads Sig, Olivier Danvy e Mayer Goldberg. "A Symmetric Approach to Compilation and Decompilation". BRICS Report Series 9, n. 37 (5 agosto 2002). http://dx.doi.org/10.7146/brics.v9i37.21752.
Testo completo"Decompile: automatic knowledge acquisition from concurrent reports using production system architectures". Knowledge-Based Systems 3, n. 2 (giugno 1990): 125. http://dx.doi.org/10.1016/0950-7051(90)90014-9.
Testo completoNghi Phu, Tran, Nguyen Dai Tho, Le Huy Hoang, Nguyen Ngoc Toan e Nguyen Ngoc Binh. "An Efficient Algorithm to Extract Control Flow-Based Features for IoT Malware Detection". Computer Journal, 28 ottobre 2020. http://dx.doi.org/10.1093/comjnl/bxaa087.
Testo completoBaguna, Nabella L., Sifrid S. Pangemanan e Treesje Runtu. "ANALISIS PERHITUNGAN DAN PELAPORAN PAJAK PENGHASILAN PASAL 21 PEGAWAI TETAP PADA PT. BANK RAKYAT INDONESIA KANTOR". GOING CONCERN : JURNAL RISET AKUNTANSI 12, n. 2 (29 novembre 2017). http://dx.doi.org/10.32400/gc.12.2.17685.2017.
Testo completoRizqony, Yusril Izza, Denar Regata Akbi e Fauzi Dwi Sumadi Setiawan. "Analisis Karakteristik Malware Joker Berdasarkan Fitur Menggunakan Metode Statik Pada Platform Android". Jurnal Repositor 2, n. 10 (21 settembre 2020). http://dx.doi.org/10.22219/repositor.v2i10.1145.
Testo completoZhu, Jie, Thanjai Vadivel e C. B. Sivaparthipan. "Bigdata Assisted Energy Conversion Model for Innovative City Application". Journal of Interconnection Networks, 4 agosto 2021, 2141008. http://dx.doi.org/10.1142/s0219265921410085.
Testo completo