Showing 1 - 20 results of 212,415 for search '(effective OR executive) (method OR methods)', query time: 0.82s Refine Results
  1. 1

    Detecting Malicious .NET Executables Using Extracted Methods Names by Hamdan Thabit, Rami Ahmad, Ahmad Abdullah, Abedallah Zaid Abualkishik, Ali A. Alwan

    Published 2025-01-01
    “…The .NET framework is widely used for software development, making it a target for a significant number of malware attacks by developing malicious executables. Previous studies on malware detection often relied on developing generic detection methods for Windows malware that were not tailored to the unique characteristics of .NET executables. …”
    Get full text
    Article
  2. 2

    METHOD OF DISPLAYING AN EXECUTABLE BUSINESS PROCESS MODELS INTO PETRI NETS by Igor G. Fedorov

    Published 2016-08-01
    “…The aim is to study the methods of displaying an executable business process model in a Petri net. …”
    Get full text
    Article
  3. 3

    The role of project delivery methods on the execution of construction projects in Kenyan Judiciary by John Fredrick Okello, Omondi Bowa, Joash Migosi

    Published 2025-03-01
    Subjects: “…Key Word; Project delivery methods, execution of construction projects, Kenyan judiciary, time, cost, site disputes, quality, mixed-methods research.…”
    Get full text
    Article
  4. 4
  5. 5
  6. 6
  7. 7

    Effective methods of teaching regional studies by Victoria R. Sagitova, Elvira R. Galiullina, Louise K. Karimova

    Published 2025-06-01
    “…The methods presented by the authors of the article are considered to be the most effective in the process of training students of regional studies in accordance with the requirements of the competence approach of the federal state educational standards. …”
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Some absolutely effective product methods by H. P. Dikshit, J. A. Fridy

    Published 1992-01-01
    “…It is proved that the product method A(C,1), where (C,1) is the Cesàro arithmetic mean matrix, is totally effective under certain conditions concerning the matrix A. …”
    Get full text
    Article
  11. 11

    Security protocol code analysis method combining model learning and symbolic execution by Xieli ZHANG, Yuefei ZHU, Chunxiang GU, Xi CHEN

    Published 2021-10-01
    “…Symbolic execution can comprehensively analyze program execution space in theory, but it is not feasible in practice for large programs like security protocols, due to the explosion of path space and the limitation of difficulty in solving path constraints.According to the characteristics of security protocol program, a method to guide the symbolic execution of security protocol code by using protocol state machine information obtained from model learning was proposed.At the same time, by separating cryptographic logic from protocol interaction logic, the problem that path constraints cannot be solved caused by the complexity of cryptographic logic is avoided.The feasibility of the method is demonstrated by the practice on the SSH open source project Dropbear.Compared with Dropbear's test suite, the proposed method has advantages in code coverage and error point discovery.…”
    Get full text
    Article
  12. 12

    COMPARATIVE ANALYSIS OF PLASTERING WORK EXECUTION TIME ON LABOUR PRODUCTIVITY WITH WORK SAMPLING METHOD by Dwi Dzulma Susanti, Fepy Supriani, Rena Misliniyati, Lindung Zalbuin Mase, Hardiansyah

    Published 2025-05-01
    “…This study aims to analyze the level of productivity and the level of Labor Utilization Rate (LUR) in plastering work using the work sampling method, and the most effective time correlation between morning and afternoon. …”
    Get full text
    Article
  13. 13

    Symbolic execution based control flow graph extraction method for Android native codes by Hui-ying YAN, Zhen-ji ZHOU, Li-fa WU, Zheng HONG, He SUN

    Published 2017-07-01
    “…A symbolic execution based method was proposed to automatically extract control flow graphs from native libraries of Android applications.The proposed method can provide execution environments for functions in native libraries,simulate JNI function call processes and solve symbols using constraint solver.A control flow graph extraction prototype system named CFGNative was implemented.The experiment results show that CFGNative can accurately distinguish all the JNI function calls and native methods of the representative example,and reach high code coverage within acceptable time.…”
    Get full text
    Article
  14. 14

    Method of Monitoring Correctness of Execution of Processes in Operating Systems by Control of Dimensional Systems of Variables by Vladimir Abramov, Danila Puchkin

    Published 2024-07-01
    “…Detection of disruptions by the method can be executed regardless of reasons of a process execution disruption. …”
    Get full text
    Article
  15. 15

    Effective forensic methods in the investigation of corruption crimes by Carmen-Lorena VLĂDUŢ

    Published 2025-04-01
    “…The involvement of key informants and witnesses strengthens investigative efforts by providing access to vital information and details about crimes and the individuals involved. The effective implementation of these forensic methods in combating corruption offenses is crucial for maintaining the integrity of institutions and for countering the spread of corruption, both nationally and internationally.…”
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    An Effective News Recommendation Method for Microblog User by Wanrong Gu, Shoubin Dong, Zhizhao Zeng, Jinchao He

    Published 2014-01-01
    “…In order to solve these issues, we propose an effective personalized news recommendation method based on microblog user profile building and sub class popularity prediction, in which we propose a news organization method using hybrid classification and clustering, implement a sub class popularity prediction method, and construct user profile according to our actual situation. …”
    Get full text
    Article
  19. 19
  20. 20