共 50 条
- [21] Combining Holistic Source Code Representation with Siamese Neural Networks for Detecting Code Clones TESTING SOFTWARE AND SYSTEMS, ICTSS 2021, 2022, 13045 : 148 - 159
- [22] Method for Detecting Unknown Malicious Executables RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2009, 5758 : 376 - 377
- [24] Interprocedural static slicing of binary executables THIRD IEEE INTERNATIONAL WORKSHOP ON SOURCE CODE ANALYSIS AND MANIPULATION - PROCEEDINGS, 2003, : 118 - 127
- [26] Renovo: A Hidden Code Extractor for Packed Executables WORM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON RECURRING MALCODE, 2007, : 46 - 53
- [27] Statically detecting use after free on binary code JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2014, 10 (03): : 211 - 217
- [28] A Novel Approach for Detecting Type-IV Clones in Test Code 2019 IEEE 13TH INTERNATIONAL WORKSHOP ON SOFTWARE CLONES (IWSC '19), 2019, : 8 - 12
- [29] Detecting Java']Java Code Clones Based on Bytecode Sequence Alignment IEEE ACCESS, 2019, 7 : 22421 - 22433