-
121
Process Mining: Auditing Approach Based on Process Discovery Using Frequency Paths Concept
Published 2022-11-01Subjects: Get full text
Article -
122
ActiMon: Unified JOP and ROP Detection With Active Function Lists on an SoC FPGA
Published 2019-01-01Subjects: Get full text
Article -
123
Enhanced Specific Mechanism of Separation by Polymeric Membrane Modification—A Short Review
Published 2021-11-01Subjects: Get full text
Article -
124
Simulation of dilatancy-controlled gas migration processes in saturated bentonite using a coupled multiphase flow and elastoplastic H2M model
Published 2023-04-01Subjects: Get full text
Article -
125
A Novel Source Code Clone Detection Method Based on Dual-GCN and IVHFS
Published 2023-03-01Subjects: Get full text
Article -
126
6.189 A Gentle Introduction to Programming Using Python, January IAP 2010
Published 2010Subjects: Get full text
-
127
6.00 Introduction to Computer Science and Programming, Fall 2007
Published 2007Subjects: Get full text
-
128
6.00 Introduction to Computer Science and Programming, Fall 2008
Published 2023Subjects: Get full text
-
129
-
130
Fault-tolerant method for anti-SEU of embedded system based on dual-core processor
Published 2019-10-01Subjects: Get full text
Article -
131
Empirical analysis of existence dependency properties in object-oriented software
Published 2008“…Our statistical validation gives evidence to support the validity of the control flow graph patterns.…”
Get full text
Thesis -
132
Dynamic analysis of virtualization- and dispatching-obfuscated applications
Published 2018-10-01“…Another obfuscation method known as “dispatching” can be used to transform application control flow similarly to virtual machine insertion. …”
Get full text
Article -
133
Software protection through obfuscation
Published 2015“…Following the two control flow obfuscation techniques obscuring the control flow within functions, we developed an inter-functional control flow obfuscation technique. …”
Get full text
Thesis -
134
On the Automatic Analysis of the Practical Resistance of Obfusting Transformations
Published 2019-09-01“…The control flow graph is considered as the basis for building other candidates for program similarity indicators. …”
Get full text
Article -
135
On a Function Representation in an Imperative Program Model Specified by Petri Nets
Published 2011-06-01“…This approach makes it possible to present a program control flow model in a whole as a composition of constituent control flow models of each function. …”
Get full text
Article -
136
Synthesis from Probabilistic Components
Published 2014-06-01“…They proved that dataflow synthesis is undecidable, while control-flow synthesis is decidable. In this work, we consider the problem of control-flow synthesis from libraries of probabilistic components . …”
Get full text
Article -
137
Hands-on Microsoft SQL server 2008 integration services /
Published c201“…Introducing SQL server integration services -- Getting started with wizards -- Nuts and bolts of the SSIS workflow -- Integration services control flow containers -- Integration services control flow tasks -- Administering integration services -- Securing integration services packages -- Advanced features of integration services -- Data flow components -- Data flow transformations -- Programming integration services -- Data warehousing and SQL server 2008 enhancements -- Deploying integration services packages -- Migrating to integration services 2008 -- Troubleshooting and performance enhancements.…”
-
138
Analysis of defenses against code reuse attacks on modern and new architectures
Published 2016Get full text
Thesis -
139
Program Analysis by Digital Computer
Published 2023“…First, the program control flow is detected; second, that control flow is used to determine the program data flow or data processing. …”
Get full text
-
140
A graphical method for automatic code generation from extended s-system petri net models
Published 2006“…This involves the development of a procedure for automatically mapping S-System Petri Net models constructed in the diagram editor to control flow graphs. The procedure uses a notion called graph nesting to help the design tool read and understand S-System model diagrams and transform them into control flow graphs. …”
Get full text
Get full text
Get full text
Thesis