共 50 条
- [21] Run-time malware detection based on IRP [J]. Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2011, 39 (02): : 113 - 117
- [22] Run-time spatial locality detection and optimization [J]. THIRTIETH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE, PROCEEDINGS, 1997, : 57 - 64
- [23] Run-time Attack Detection in Cryptographic APIs [J]. 2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 176 - 188
- [24] Run-time efficient feasibility analysis of uni-processor systems with static priorities [J]. EMBEDDED SYSTEM DESIGN: TOPICS, TECHNIQUES AND TRENDS, 2007, 231 : 37 - +
- [25] A Method of Run-Time Detecting DDoS Attacks [J]. PROCEEDINGS OF THE 12TH WSEAS INTERNATIONAL CONFERENCE ON COMPUTERS , PTS 1-3: NEW ASPECTS OF COMPUTERS, 2008, : 393 - +
- [26] Using Run-Time Information to Enhance Static Analysis of Machine Learning Code in Notebooks [J]. COMPANION PROCEEDINGS OF THE 32ND ACM INTERNATIONAL CONFERENCE ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, FSE COMPANION 2024, 2024, : 497 - 501
- [27] A full automatic detection method for security policy of JVM run-time library [J]. Sun, J.-H. (jhsun@aimlab.org), 1600, Chinese Institute of Electronics (41):
- [30] A method for fast hardware specialization at run-time [J]. 2007 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, VOLS 1 AND 2, 2007, : 35 - 40