共 50 条
- [22] AUTOMATED TERMINATION ANALYSIS OF JAVA']JAVA BYTECODE BY TERM REWRITING PROCEEDINGS OF THE 21ST INTERNATIONAL CONFERENCE ON REWRITING TECHNIQUES AND APPLICATIONS (RTA'10), 2010, 6 : 259 - 275
- [23] Mobile code security by Java']Java bytecode dependence analysis IEEE INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2004 (ISCIT 2004), PROCEEDINGS, VOLS 1 AND 2: SMART INFO-MEDIA SYSTEMS, 2004, : 923 - 926
- [25] Magic-sets transformation for the analysis of Java']Java bytecode STATIC ANALYSIS, PROCEEDINGS, 2007, 4634 : 452 - +
- [26] Verified Java']Java Bytecode Verification IT-INFORMATION TECHNOLOGY, 2005, 47 (02): : 107 - 110
- [27] An Evaluation of Current Java']Java Bytecode Decompilers 2009 NINTH IEEE INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION, PROCEEDINGS, 2009, : 129 - 136
- [28] Vulnerabilities Constraint Based Analysis Approach for Java']Java Bytecode Programs PROCEEDINGS OF 2018 6TH INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2018, : 93 - 98
- [30] Verification of Java']Java bytecode using analysis and transformation of logic programs PRACTICAL ASPECTS OF DECLARATIVE LANGUAGES, 2007, 4354 : 124 - +