Results 21 to 30 of about 30,621 (198)
On the Performance Evaluation of Protocol State Machine Reverse Engineering Methods
Having access to the specifications of network protocols is essential for several reasons in IT security. When the specifications are not known, one may turn to protocol reverse engineering methods to reconstruct these, typically by analysing recorded ...
Gergo Ladi, Tamas Holczer
doaj +1 more source
An Automated Framework for Runtime Analysis of Malicious Executables on Linux
One way of testing a malware detection tool is to expose it to a large number of diverse malware samples and verify its detection accuracy. During these tests, the host system must not be harmed by malware and yet be able to analyze its harmful behavior.
I. Vurdelja +3 more
doaj +1 more source
Innovating Aircraft Repair Processes: The Role of Digitalization in Sustainability
This research explores how digitalization—by storing detailed non‐destructive testing data in structured DICONDE databases and creating a standard data model of the component—innovates aviation maintenance and repair processes. Coupled with a developed state‐based simulation model, it enables data‐driven, sustainable repair strategies that reduce waste,
Johanna Aigner +3 more
wiley +1 more source
Comparative Analysis of Mobile App Reverse Engineering Methods on Dalvik and ART [PDF]
The runtime system for the Android platform has changed to ART. ART differs from previously used Dalvik in that it is to be a runtime environment for the application’s machine code. As a result, ART does not execute Dalvik bytecode through an interpreter
Geonbae Na +3 more
doaj
System Runs Analysis with Process Mining
Information systems (IS) produce numerous traces and logs at runtime. In the context of SOA-based (service-oriented architecture) IS, these logs contain details about sequences of process and service calls.
S. A. Shershakov, V. A. Rubin
doaj +1 more source
Static Analysis of Run-Time Errors in Embedded Real-Time Parallel C Programs [PDF]
We present a static analysis by Abstract Interpretation to check for run-time errors in parallel and multi-threaded C programs. Following our work on Astr\'ee, we focus on embedded critical programs without recursion nor dynamic memory allocation, but ...
Antoine Miné
doaj +1 more source
This article presents the NFDI‐MatWerk Ontology (MWO), a Basic Formal Ontology‐based framework for interoperable research data management in materials science and engineering (MSE). Covering consortium structures, research data management resources, services, and instruments, MWO enables semantic integration, Findable, Accessible, Interoperable, and ...
Hossein Beygi Nasrabadi +4 more
wiley +1 more source
DfAnalyzer: Runtime dataflow analysis tool for Computational Science and Engineering applications
DfAnalyzer is a tool for monitoring, debugging, and analyzing dataflows generated by Computational Science and Engineering (CSE) applications. It collects strategic raw data, registering provenance data, and enabling query processing, all asynchronously ...
Vítor Silva +7 more
doaj +1 more source
A transparent, laser‐microscribed glass platform enables cancer diagnosis within 1 h—much faster than histology, which takes days, and free from the chemical or contrast risks of MRI or CT scans. The antibody‐functionalized rough glass surface captures viable cancer cells directly from suspension, allowing instant optical readout and offering a rapid ...
Anish Pal +5 more
wiley +1 more source
Fault localization approach for null pointer exception
A novel approach to locate the fault for null pointer exception is presented.The approach first computes the static slice guided by the runtime stack,then conducts a null-pointer analysis and aliases analysis on the sliced program and obtains the ...
Shu-juan JIANG +5 more
doaj +2 more sources

