[1] |
LI Feng, SHU Fei, LI Mingxuan, WANG Bin, YANG Huiting.
Detection of Remote Access Trojan in Linux Based on Deep Learning
[J]. Computer Engineering, 2020, 46(7): 159-164.
|
[2] |
MA Futian,QIAN Xuezhong,SONG Wei.
An Automated Cross-site Scripting Loopholes Discovery Model
[J]. Computer Engineering, 2018, 44(8): 167-173.
|
[3] |
XIE Jiayun,FU Xiao,LUO Bin.
Research Progress of Android Protection Technology
[J]. Computer Engineering, 2018, 44(2): 163-170,176.
|
[4] |
GU Jiateng,XIN Yang.
XSS Vulnerability Detection Model Based on Dynamic Analysis
[J]. Computer Engineering, 2018, 44(10): 34-41.
|
[5] |
ZHANG Lu,MAO Weiwei,LIANG Qing,ZHOU Feng.
Research on Control of Crus Vibration Attenuation for Biped Robots
[J]. Computer Engineering, 2018, 44(1): 30-34,43.
|
[6] |
SUN He,WU Lifa,HONG Zheng,YAN Huiying,ZHANG Yafeng.
A Function Call Graph Extraction Method Combining Static and Dynamic Analysis
[J]. Computer Engineering, 2017, 43(3): 154-162.
|
[7] |
MA Dongdong,ZHONG Lujie,ZHU Jingru.
Parallel Extraction of Program Analysis Information on LLVM Based on GPU
[J]. Computer Engineering, 2017, 43(10): 23-30.
|
[8] |
XIAO Kejun,YU Haibo,CHEN Yuting,ZHONG Hao.
Seeker:Flow-sensitive Demand-driven Points-to Analysis
[J]. Computer Engineering, 2016, 42(11): 70-75.
|
[9] |
QIU Yang,WANG Yijun,XUE Zhi.
Python Attack Script Analysis Platform Based on Symbolic Execution
[J]. Computer Engineering, 2016, 42(11): 139-146.
|
[10] |
LIU Chunhong,XU Lihua,YAN Ting,YANG Zongyuan.
Segmented Code Testing Based on Concolic Testing and Dynamic Analysis
[J]. Computer Engineering, 2015, 41(2): 63-69,80.
|
[11] |
WU Tong,CHEN Yu-ting.
JavaScript Code Recommendation Based on Dynamic Analysis
[J]. Computer Engineering, 2014, 40(10): 66-70.
|
[12] |
ZHANG Beng, LI Qing-Bao, CUI Chen.
Dynamic Control Flow Recovery Algorithm Based on Automatic Path Driven
[J]. Computer Engineering, 2013, 39(8): 77-82.
|
[13] |
FAN Jing, ZHANG Cheng.
High Precision Program Log Paring Technology Based on Static Analysis
[J]. Computer Engineering, 2013, 39(10): 68-71,75.
|
[14] |
WANG Die, JIANG Tong-Hai, DONG Jun, ZHOU Chi.
Implementation of Executable Code Test Tools Based on Path Coverage Instrumentation
[J]. Computer Engineering, 2012, 38(5): 35-37,40.
|
[15] |
HAN Yu-Xiang, LIU Qing-Li, LIU Long, SU Xiao-Yan.
An Analysis Method of Cisco IOS Communication Process
[J]. Computer Engineering, 2012, 38(18): 282-285.
|