共 50 条
- [21] A Trace Agent with Code No-invasion Based on Byte Code Enhancement Technology PROCEEDINGS OF 2019 IEEE 10TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2019), 2019, : 405 - 409
- [22] Portable worst-case execution time analysis using Java']Java Byte Code EUROMICRO RTS 2000: 12TH EUROMICRO CONFERENCE ON REAL-TIME SYSTEMS, PROCEEDINGS, 2000, : 81 - 88
- [23] JAVA']JAVA Byte Code File Encryption Research FUTURE COMPUTER, COMMUNICATION, CONTROL AND AUTOMATION, 2011, 119 : 629 - 633
- [24] TWO-BYTE CODE CONVERSION METHOD. IBM technical disclosure bulletin, 1984, 27 (05): : 2969 - 2972
- [27] FOUNDATIONAL CERTIFICATION OF CODE TRANSFORMATIONS USING AUTOMATIC DIFFERENTIATION COMPUTER SCIENCE-AGH, 2014, 15 (02): : 215 - 236
- [29] Locating SQL Injection Vulnerabilities in Java']Java Byte Code using Natural Language Techniques IEEE SOUTHEASTCON 2018, 2018,