-
121
-
122
Program state optimal method based on variable symbolic relation analysis
Published 2018-06-01Subjects: Get full text
Article -
123
Symbolic execution optimization method based on input constraint
Published 2019-03-01Subjects: “…symbolic execution…”
Get full text
Article -
124
An analysis of tax avoidance of family companies in Indonesia
Published 2023-09-01Subjects: “…thin capitalization, executives characteristics, transfer pricing, tax avoidance…”
Get full text
Article -
125
Metrics for code obfuscation based on symbolic execution and N-scope complexity
Published 2022-12-01Subjects: Get full text
Article -
126
-
127
Ergonomes et préventionnistes : étude d’une pratique de collaboration dans le cadre d’un projet de conception d’une usine - 1ère de 2 parties
Published 2004-05-01Subjects: Get full text
Article -
128
Software patch comparison technology through semantic analysis on function
Published 2019-10-01Subjects: Get full text
Article -
129
MALVADA: A framework for generating datasets of malware execution traces
Published 2025-05-01Subjects: Get full text
Article -
130
AKIL HASTALIĞI NEDENİYLE CEZANIN İNFAZININ ERTELENMESİ
Published 2025-01-01Subjects: Get full text
Article -
131
Symbolic execution based control flow graph extraction method for Android native codes
Published 2017-07-01Subjects: Get full text
Article -
132
Contributions to the elucidation of a controversial episode. The Ciulei Case. (2)
Published 2025-01-01Subjects: Get full text
Article -
133
Assessment of Stakeholder Involvement and Borehole Water Projects Delivery in Kogi West Senatorial District, Nigeria
Published 2023-06-01Subjects: Get full text
Article -
134
Research and implementation of data security for mobile terminal based on TEE
Published 2017-03-01Subjects: Get full text
Article -
135
-
136
Cerimónias de execução pública no Antigo Regime - escatologia e justiça
Published 2001-11-01Subjects: Get full text
Article -
137
SQLMVED: SQL injection runtime prevention system based on multi-variant execution
Published 2021-04-01Subjects: Get full text
Article -
138
Method against process control-flow hijacking based on mimic defense
Published 2021-01-01Subjects: Get full text
Article -
139
Interpretable Detection of Malicious Behavior in Windows Portable Executables Using Multi-Head 2D Transformers
Published 2024-06-01Subjects: Get full text
Article -
140
Security protocol code analysis method combining model learning and symbolic execution
Published 2021-10-01Subjects: Get full text
Article