Volltext-Artikel, eBooks und vieles mehr aus dem EBSCO Discovery Service

Das Gesuchte nicht gefunden? Schauen Sie in der Onleihe oder machen Sie einen Kaufvorschlag

Treffer 1 - 20 von 258

1

Levels of Binary Equivalence for the Comparison of Binaries from Alternative Builds
Dietrich, Jens ; White, Tim ; Hassanshahi, Behnaz ; et al.
2025 IEEE International Conference on Software Maintenance and Evolution (ICSME) ICSME Software Maintenance and Evolution (ICSME), 2025 IEEE International Conference on. :576-587 Sep, 2025

Konferenz
2

MiniLib: A flow analysis–based approach for attack surface reduction through software debloating
Kopanias, Loukas ; Sotiropoulos, Panagiotis ; Kolokotronis, Nicholas ; et al.
2025 IEEE International Conference on Cyber Security and Resilience (CSR) Cyber Security and Resilience (CSR), 2025 IEEE International Conference on. :260-266 Aug, 2025

Konferenz
3

Mutation Testing of Java Bytecode: A Model-Driven Approach
Bockisch, Christoph ; Eren, Deniz ; Lehmann, Sascha ; et al.
Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems. :237-248

Konferenz
4

Abstract Interpretation of Java Bytecode in Sturdy
Marx, Stefan ; Erdweg, Sebastian
Proceedings of the 26th ACM International Workshop on Formal Techniques for Java-like Programs. :17-22

Konferenz
5

StoneDetector: Structural and Sub-Clone Detection
Schafer, Andre ; Amme, Wolfram ; Heinze, Thomas S.
2023 IEEE 17th International Workshop on Software Clones (IWSC) IWSC Software Clones (IWSC), 2023 IEEE 17th International Workshop on. :33-36 Oct, 2023

Konferenz
6

Finding Source Code Clones in Intermediate Representations of Java Bytecode
Schafer, Andre ; Heinze, Thomas S. ; Amme, Wolfram
2023 IEEE 17th International Workshop on Software Clones (IWSC) IWSC Software Clones (IWSC), 2023 IEEE 17th International Workshop on. :37-43 Oct, 2023

Konferenz
7

Performance Study of Kotlin and Java Program Considering Bytecode Instructions and JVM JIT Compiler
Sonoyama, Atsuya ; Kamiyama, Takeshi ; Oguchi, Masato ; et al.
2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW) CANDARW Computing and Networking Workshops (CANDARW), 2021 Ninth International Symposium on. :127-133 Nov, 2021

Konferenz
8

LibCapsule: Complete Confinement of Third-Party Libraries in Android Applications
Qiu, J. ; Yang, X. ; Wu, H. ; et al.
IEEE Transactions on Dependable and Secure Computing IEEE Trans. Dependable and Secure Comput. Dependable and Secure Computing, IEEE Transactions on. 19(5):2873-2889 Jan, 2022

Fachzeitschrift
9

Observation of Method Invocation in Application Runtime in Android for CPU Clock Rate Adjustment
Kumakura, Kota ; Sonoyama, Atsuya ; Kamiyama, Takeshi ; et al.
2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW) CANDARW Computing and Networking Workshops (CANDARW), 2021 Ninth International Symposium on. :481-483 Nov, 2021

Konferenz
10

The Strengths and Behavioral Quirks of Java Bytecode Decompilers
Harrand, Nicolas ; Soto-Valero, Cesar ; Monperrus, Martin ; et al.
2019 19th International Working Conference on Source Code Analysis and Manipulation (SCAM) SCAM Source Code Analysis and Manipulation (SCAM), 2019 19th International Working Conference on. :92-102 Sep, 2019

Konferenz
11

Constraint Based Testing and Verification of Java Bytecode Programs
Achour, Safaa ; Benattou, Mohammzed
2018 IEEE 5th International Congress on Information Science and Technology (CiSt) Information Science and Technology (CiSt), 2018 IEEE 5th International Congress on. :64-69 Oct, 2018

Konferenz
12

Vulnerabilities Constraint Based Analysis Approach for Java Bytecode Programs
Achour, Safaa ; Benattou, Mohammed
2018 6th International Conference on Multimedia Computing and Systems (ICMCS) Multimedia Computing and Systems (ICMCS), 2018 6th International Conference on. :1-6 May, 2018

Konferenz
13

Dynamic symbolic execution of Java programs using JNI
Vartanov, Sergey
2017 Computer Science and Information Technologies (CSIT) Computer Science and Information Technologies (CSIT), 2017. :83-86 Sep, 2017

Konferenz
14

Detecting Java Code Clones with Multi-granularities Based on Bytecode
Yu, Dongjin ; Wang, Jie ; Wu, Qing ; et al.
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) COMPSAC Computer Software and Applications Conference (COMPSAC), 2017 IEEE 41st Annual. 1:317-326 Jul, 2017

Konferenz
15

Detecting Java Code Clones Based on Bytecode Sequence Alignment
Yu, D. ; Yang, J. ; Chen, X. ; et al.
IEEE Access Access, IEEE. 7:22421-22433 2019

Fachzeitschrift
16

Test case generation for Java Bytecode programs annotated with BML specifications
Achour, Safaa ; Benattou, Mohammed
2016 5th International Conference on Multimedia Computing and Systems (ICMCS) Multimedia Computing and Systems (ICMCS), 2016 5th International Conference on. :605-610 Sep, 2016

Konferenz
17

Negative Effects of Bytecode Instrumentation on Java Source Code Coverage
Tengeri, David ; Horvath, Ferenc ; Beszedes, Arpad ; et al.
2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER) Software Analysis, Evolution, and Reengineering (SANER), 2016 IEEE 23rd International Conference on. 1:225-235 Mar, 2016

Konferenz
18

JavaPDG: A New Platform for Program Dependence Analysis
Shu, Gang ; Sun, Boya ; Henderson, Tim A.D. ; et al.
2013 IEEE Sixth International Conference on Software Testing, Verification and Validation Software Testing, Verification and Validation (ICST), 2013 IEEE Sixth International Conference on. :408-415 Mar, 2013

Konferenz
19

Instruction-Words Based Software Birthmark
Ma, Lianhong ; Wang, Yong ; Liu, Fenlin ; et al.
2012 Fourth International Conference on Multimedia Information Networking and Security Multimedia Information Networking and Security (MINES), 2012 Fourth International Conference on. :909-912 Nov, 2012

Konferenz
20

Java bytecode clone detection via relaxation on code fingerprint and Semantic Web reasoning
Keivanloo, Iman ; Roy, Chanchai K. ; Rilling, Juergen
2012 6th International Workshop on Software Clones (IWSC) Software Clones (IWSC), 2012 6th International Workshop on. :36-42 Jun, 2012

Konferenz

Filter