Results 21 to 30 of about 30,621 (198)

On the Performance Evaluation of Protocol State Machine Reverse Engineering Methods

open access: yesJournal of Communications Software and Systems
Having access to the specifications of network protocols is essential for several reasons in IT security. When the specifications are not known, one may turn to protocol reverse engineering methods to reconstruct these, typically by analysing recorded ...
Gergo Ladi, Tamas Holczer
doaj   +1 more source

An Automated Framework for Runtime Analysis of Malicious Executables on Linux

open access: yesTelfor Journal, 2021
One way of testing a malware detection tool is to expose it to a large number of diverse malware samples and verify its detection accuracy. During these tests, the host system must not be harmed by malware and yet be able to analyze its harmful behavior.
I. Vurdelja   +3 more
doaj   +1 more source

Innovating Aircraft Repair Processes: The Role of Digitalization in Sustainability

open access: yesAdvanced Engineering Materials, EarlyView.
This research explores how digitalization—by storing detailed non‐destructive testing data in structured DICONDE databases and creating a standard data model of the component—innovates aviation maintenance and repair processes. Coupled with a developed state‐based simulation model, it enables data‐driven, sustainable repair strategies that reduce waste,
Johanna Aigner   +3 more
wiley   +1 more source

Comparative Analysis of Mobile App Reverse Engineering Methods on Dalvik and ART [PDF]

open access: yesJournal of Internet Services and Information Security, 2016
The runtime system for the Android platform has changed to ART. ART differs from previously used Dalvik in that it is to be a runtime environment for the application’s machine code. As a result, ART does not execute Dalvik bytecode through an interpreter
Geonbae Na   +3 more
doaj  

System Runs Analysis with Process Mining

open access: yesМоделирование и анализ информационных систем, 2015
Information systems (IS) produce numerous traces and logs at runtime. In the context of SOA-based (service-oriented architecture) IS, these logs contain details about sequences of process and service calls.
S. A. Shershakov, V. A. Rubin
doaj   +1 more source

Static Analysis of Run-Time Errors in Embedded Real-Time Parallel C Programs [PDF]

open access: yesLogical Methods in Computer Science, 2012
We present a static analysis by Abstract Interpretation to check for run-time errors in parallel and multi-threaded C programs. Following our work on Astr\'ee, we focus on embedded critical programs without recursion nor dynamic memory allocation, but ...
Antoine Miné
doaj   +1 more source

NFDI MatWerk Ontology (MWO): A BFO‐Compliant Ontology for Research Data Management in Materials Science and Engineering

open access: yesAdvanced Engineering Materials, EarlyView.
This article presents the NFDI‐MatWerk Ontology (MWO), a Basic Formal Ontology‐based framework for interoperable research data management in materials science and engineering (MSE). Covering consortium structures, research data management resources, services, and instruments, MWO enables semantic integration, Findable, Accessible, Interoperable, and ...
Hossein Beygi Nasrabadi   +4 more
wiley   +1 more source

DfAnalyzer: Runtime dataflow analysis tool for Computational Science and Engineering applications

open access: yesSoftwareX, 2020
DfAnalyzer is a tool for monitoring, debugging, and analyzing dataflows generated by Computational Science and Engineering (CSE) applications. It collects strategic raw data, registering provenance data, and enabling query processing, all asynchronously ...
Vítor Silva   +7 more
doaj   +1 more source

Laser‐Microscribed Glass Enables Surface‐Microfluidics‐Facilitated, Affordable, Rapid Cancer Diagnosis

open access: yesAdvanced Functional Materials, EarlyView.
A transparent, laser‐microscribed glass platform enables cancer diagnosis within 1 h—much faster than histology, which takes days, and free from the chemical or contrast risks of MRI or CT scans. The antibody‐functionalized rough glass surface captures viable cancer cells directly from suspension, allowing instant optical readout and offering a rapid ...
Anish Pal   +5 more
wiley   +1 more source

Fault localization approach for null pointer exception

open access: yesTongxin xuebao, 2015
A novel approach to locate the fault for null pointer exception is presented.The approach first computes the static slice guided by the runtime stack,then conducts a null-pointer analysis and aliases analysis on the sliced program and obtains the ...
Shu-juan JIANG   +5 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy