Gotowa bibliografia na temat „Control Flow Graph (CFG)”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Control Flow Graph (CFG)”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Control Flow Graph (CFG)"
Koppel, James, Jackson Kearl, and Armando Solar-Lezama. "Automatically deriving control-flow graph generators from operational semantics." Proceedings of the ACM on Programming Languages 6, ICFP (2022): 742–71. http://dx.doi.org/10.1145/3547648.
Pełny tekst źródłaQiu, Dehong, Jialin Sun, and Hao Li. "Improving Similarity Measure for Java Programs Based on Optimal Matching of Control Flow Graphs." International Journal of Software Engineering and Knowledge Engineering 25, no. 07 (2015): 1171–97. http://dx.doi.org/10.1142/s0218194015500229.
Pełny tekst źródłaKapoor, Akshay, and Sunita Dhavale. "Control Flow Graph Based Multiclass Malware Detection Using Bi-normal Separation." Defence Science Journal 66, no. 2 (2016): 138. http://dx.doi.org/10.14429/dsj.66.9701.
Pełny tekst źródłaWANG, XUEXIANG, HANLAI PU, JUN YANG, and LONGXING SHI. "EXTENDED CONTROL FLOW GRAPH BASED PERFORMANCE AND ENERGY CONSUMPTION OPTIMIZATION USING SCRATCH-PAD MEMORY." Journal of Circuits, Systems and Computers 18, no. 04 (2009): 697–711. http://dx.doi.org/10.1142/s0218126609005204.
Pełny tekst źródłaWONG, W. ERIC, and YU LEI. "REACHABILITY GRAPH-BASED TEST SEQUENCE GENERATION FOR CONCURRENT PROGRAMS." International Journal of Software Engineering and Knowledge Engineering 18, no. 06 (2008): 803–22. http://dx.doi.org/10.1142/s0218194008003878.
Pełny tekst źródłaDong, Kwan Kim. "Enhancing code clone detection using control flow graphs." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 3804–12. https://doi.org/10.11591/ijece.v9i5.pp3804-3812.
Pełny tekst źródłaQiang, Weizhong, Shizhen Wang, Hai Jin, and Jiangying Zhong. "Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS." Security and Communication Networks 2018 (October 17, 2018): 1–11. http://dx.doi.org/10.1155/2018/3130652.
Pełny tekst źródłaGao, Hao, Tong Zhang, Songqiang Chen, Lina Wang, and Fajiang Yu. "FUSION: Measuring Binary Function Similarity with Code-Specific Embedding and Order-Sensitive GNN." Symmetry 14, no. 12 (2022): 2549. http://dx.doi.org/10.3390/sym14122549.
Pełny tekst źródłaStiawan, Deris, Somame Morianus Daely, Ahmad Heryanto, Nurul Afifah, Mohd Yazid Idris, and Rahmat Budiarto. "Ransomware Detection Based On Opcode Behavior Using K-Nearest Neighbors Algorithm." Information Technology and Control 50, no. 3 (2021): 495–506. http://dx.doi.org/10.5755/j01.itc.50.3.25816.
Pełny tekst źródłaPark, Jungsoo, and Souhwan Jung. "Android Adware Detection using Soot and CFG." Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 13, no. 4 (2022): 94–104. http://dx.doi.org/10.58346/jowua.2022.i4.006.
Pełny tekst źródłaRozprawy doktorskie na temat "Control Flow Graph (CFG)"
Sánchez, Yagüe Mónica. "Information extraction and validation of CDFG in NoGap." Thesis, Linköpings universitet, Datorteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-93905.
Pełny tekst źródłaSelf, Joel P. "On-the-Fly Dynamic Dead Variable Analysis." BYU ScholarsArchive, 2007. https://scholarsarchive.byu.edu/etd/886.
Pełny tekst źródłaLI, ZHEN. "Control Flow Graph Based Attacks : In the Context of Flattened Programs." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-155770.
Pełny tekst źródłaTorbey, Elie. "Control/data flow graph synthesis using evolutionary computation and behavioral estimation." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp02/NQ37080.pdf.
Pełny tekst źródłaStanier, James. "Removing and restoring control flow with the Value State Dependence Graph." Thesis, University of Sussex, 2012. http://sro.sussex.ac.uk/id/eprint/7576/.
Pełny tekst źródłaTorbey, Elie Carleton University Dissertation Engineering Electronics. "Control/data flow graph synthesis using evolutionary computation and behavioral estimation." Ottawa, 1999.
Znajdź pełny tekst źródłaStange, Yuri. "Visualization of Code Flow." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-162108.
Pełny tekst źródłaPogulis, Jakob. "Generation of dynamic control-dependence graphs for binary programs." Thesis, Linköpings universitet, Databas och informationsteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-110247.
Pełny tekst źródłaCaron, David. "Generating a control/data-flow graph representation of a circuit from VHDL for use in circuit synthesis." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape17/PQDD_0011/MQ27011.pdf.
Pełny tekst źródłaMatsusaki, Cristina Toshie Motohashi. "Redes F-MFG (Functional Mark Flow Graph) e sua aplicação no projeto de sistemas antropocêntricos." Universidade de São Paulo, 1998. http://www.teses.usp.br/teses/disponiveis/3/3132/tde-17122004-154654/.
Pełny tekst źródłaCzęści książek na temat "Control Flow Graph (CFG)"
Wei, Chenfeng, Tong Wu, Rafael Sa Menezes, et al. "ESBMC v7.7: Automating Branch Coverage Analysis Using CFG-Based Instrumentation and SMT Solving." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-90900-9_15.
Pełny tekst źródłaHills, Mark. "Streamlining Control Flow Graph Construction with DCFlow." In Software Language Engineering. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11245-9_18.
Pełny tekst źródłaArlt, Stephan, Philipp Rümmer, and Martin Schäf. "A Theory for Control-Flow Graph Exploration." In Automated Technology for Verification and Analysis. Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-02444-8_44.
Pełny tekst źródłaXia, Rongze, and Baojiang Cui. "Malware Classification Based on Graph Neural Network Using Control Flow Graph." In Lecture Notes in Networks and Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90072-4_13.
Pełny tekst źródłaBehera, Chandan Kumar, Genius Sanjog, and D. Lalitha Bhaskari. "Control Flow Graph Matching for Detecting Obfuscated Programs." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8848-3_26.
Pełny tekst źródłaJo, Jang-Wu, and Byeong-Mo Chang. "Constructing Control Flow Graph for Java by Decoupling Exception Flow from Normal Flow." In Computational Science and Its Applications – ICCSA 2004. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24707-4_14.
Pełny tekst źródłaEvstiougov-Babaev, exander A. "Call Graph and Control Flow Graph Visualization for Developers of Embedded Applications." In Software Visualization. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45875-1_26.
Pełny tekst źródłaShin, Donghwi, Kwangwoo Lee, and Dongho Won. "Malware Variant Detection and Classification Using Control Flow Graph." In Convergence and Hybrid Information Technology. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24106-2_23.
Pełny tekst źródłaSantos Filho, D. J., and P. E. Miyagi. "Enhanced Mark Flow Graph to Control Autonomous Guided Vehicles." In Computer Applications in Production Engineering. Springer US, 1995. http://dx.doi.org/10.1007/978-0-387-34879-7_89.
Pełny tekst źródłaBruschi, Danilo, Lorenzo Martignoni, and Mattia Monga. "Detecting Self-mutating Malware Using Control-Flow Graph Matching." In Detection of Intrusions and Malware & Vulnerability Assessment. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11790754_8.
Pełny tekst źródłaStreszczenia konferencji na temat "Control Flow Graph (CFG)"
Zhu, Wenyan, Hoiio Kong, Wenzheng Cai, and Wenhao Zhu. "Traffic flow prediction based on graph attention network." In 4th International Conference on Automation Control. Algorithm and Intelligent Bionics, edited by Jing Na and Shuping He. SPIE, 2024. http://dx.doi.org/10.1117/12.3039334.
Pełny tekst źródłaXu, Yang, and Wenliang Peng. "Code Search Oriented Node-Enhanced Control Flow Graph Embedding." In 2024 IEEE International Conference on Source Code Analysis and Manipulation (SCAM). IEEE, 2024. https://doi.org/10.1109/scam63643.2024.00016.
Pełny tekst źródłaYu, Yongfu, Xingsheng Xie, and Xing Ju. "DPGARN: Dynamic Periodic Graph Attention Recurrent Network for Traffic Flow Prediction." In 2024 43rd Chinese Control Conference (CCC). IEEE, 2024. http://dx.doi.org/10.23919/ccc63176.2024.10662753.
Pełny tekst źródłaRáth, Andre, Lotte de Winter, Lauge Naur Hansen, et al. "A Graph-Based Realistic 3D Microvascular Flow Simulation for Ultrasound." In 2024 IEEE Ultrasonics, Ferroelectrics, and Frequency Control Joint Symposium (UFFC-JS). IEEE, 2024. https://doi.org/10.1109/uffc-js60046.2024.10794092.
Pełny tekst źródłaXu, Yuan, Fan Qin, Wei Ke, et al. "Local-Global Dynamic Information Fusion Graph Learning for Traffic Flow Prediction." In 2024 IEEE 13th Data Driven Control and Learning Systems Conference (DDCLS). IEEE, 2024. http://dx.doi.org/10.1109/ddcls61622.2024.10606619.
Pełny tekst źródłaMothukuri, Viraaji, Reza M. Parizi, and James L. Massa. "LLMSmartSec: Smart Contract Security Auditing with LLM and Annotated Control Flow Graph." In 2024 IEEE International Conference on Blockchain (Blockchain). IEEE, 2024. http://dx.doi.org/10.1109/blockchain62396.2024.00064.
Pełny tekst źródłaLi, Jielong, Long Chen, Jinze Liu, Jun Zhao, and Wei Wang. "Prediction of Converter Gas Recovery Flow based on A Dynamic Multi-graph Fusion Network." In 2025 IEEE 14th Data Driven Control and Learning Systems (DDCLS). IEEE, 2025. https://doi.org/10.1109/ddcls66240.2025.11065742.
Pełny tekst źródłaMa, Yi-Fan, Yali Du, and Ming Li. "Capturing the Long-Distance Dependency in the Control Flow Graph via Structural-Guided Attention for Bug Localization." In Thirty-Second International Joint Conference on Artificial Intelligence {IJCAI-23}. International Joint Conferences on Artificial Intelligence Organization, 2023. http://dx.doi.org/10.24963/ijcai.2023/249.
Pełny tekst źródłaPutra, Irfan Sofyana, Satrio Adi Rukmono, and Riza Satria Perdana. "Abstract Syntax Tree (AST) and Control Flow Graph (CFG) Construction of Notasi Algoritmik." In 2021 International Conference on Data and Software Engineering (ICoDSE). IEEE, 2021. http://dx.doi.org/10.1109/icodse53690.2021.9648437.
Pełny tekst źródłaMoreira, João, and Sandro Rigo. "Go With the FLOW: Fine-Grained Control-Flow Integrity for the Kernel." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2016. http://dx.doi.org/10.5753/sbseg.2016.19322.
Pełny tekst źródłaRaporty organizacyjne na temat "Control Flow Graph (CFG)"
Kularatne, Dhanushka N., Subhrajit Bhattacharya, and M. Ani Hsieh. Computing Energy Optimal Paths in Time-Varying Flows. Drexel University, 2016. http://dx.doi.org/10.17918/d8b66v.
Pełny tekst źródła