Showing 1 - 20 results of 5,785 for search 'executive (method OR methods)', query time: 0.20s Refine Results
  1. 1

    Detecting Malicious .NET Executables Using Extracted Methods Names by Hamdan Thabit, Rami Ahmad, Ahmad Abdullah, Abedallah Zaid Abualkishik, Ali A. Alwan

    Published 2025-01-01
    “…The .NET framework is widely used for software development, making it a target for a significant number of malware attacks by developing malicious executables. Previous studies on malware detection often relied on developing generic detection methods for Windows malware that were not tailored to the unique characteristics of .NET executables. …”
    Get full text
    Article
  2. 2

    METHOD OF DISPLAYING AN EXECUTABLE BUSINESS PROCESS MODELS INTO PETRI NETS by Igor G. Fedorov

    Published 2016-08-01
    “…The aim is to study the methods of displaying an executable business process model in a Petri net. …”
    Get full text
    Article
  3. 3

    The role of project delivery methods on the execution of construction projects in Kenyan Judiciary by John Fredrick Okello, Omondi Bowa, Joash Migosi

    Published 2025-03-01
    Subjects: “…Key Word; Project delivery methods, execution of construction projects, Kenyan judiciary, time, cost, site disputes, quality, mixed-methods research.…”
    Get full text
    Article
  4. 4
  5. 5

    Security protocol code analysis method combining model learning and symbolic execution by Xieli ZHANG, Yuefei ZHU, Chunxiang GU, Xi CHEN

    Published 2021-10-01
    “…Symbolic execution can comprehensively analyze program execution space in theory, but it is not feasible in practice for large programs like security protocols, due to the explosion of path space and the limitation of difficulty in solving path constraints.According to the characteristics of security protocol program, a method to guide the symbolic execution of security protocol code by using protocol state machine information obtained from model learning was proposed.At the same time, by separating cryptographic logic from protocol interaction logic, the problem that path constraints cannot be solved caused by the complexity of cryptographic logic is avoided.The feasibility of the method is demonstrated by the practice on the SSH open source project Dropbear.Compared with Dropbear's test suite, the proposed method has advantages in code coverage and error point discovery.…”
    Get full text
    Article
  6. 6

    Symbolic execution based control flow graph extraction method for Android native codes by Hui-ying YAN, Zhen-ji ZHOU, Li-fa WU, Zheng HONG, He SUN

    Published 2017-07-01
    “…A symbolic execution based method was proposed to automatically extract control flow graphs from native libraries of Android applications.The proposed method can provide execution environments for functions in native libraries,simulate JNI function call processes and solve symbols using constraint solver.A control flow graph extraction prototype system named CFGNative was implemented.The experiment results show that CFGNative can accurately distinguish all the JNI function calls and native methods of the representative example,and reach high code coverage within acceptable time.…”
    Get full text
    Article
  7. 7

    Method of Monitoring Correctness of Execution of Processes in Operating Systems by Control of Dimensional Systems of Variables by Vladimir Abramov, Danila Puchkin

    Published 2024-07-01
    “…Detection of disruptions by the method can be executed regardless of reasons of a process execution disruption. …”
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11

    Sources of Uncertainty in Bender Element Testing: Execution and Interpretation Challenges in Reconstituted Sandy Soils by António M. G. Pedro, Paulino Dias Santos, Luís Araújo Santos, Paulo Coelho

    Published 2025-06-01
    “…Particular emphasis is placed on the control of relative density and sample saturation during preparation, as well as on factors affecting signal quality and time lag of the system during test execution. The interpretation of the results is analyzed with respect to the limitations of currently employed methods. …”
    Get full text
    Article
  12. 12
  13. 13

    Executive functioning in children with ADHD Investigating the cross-method correlations between performance tests and rating scales by Olsen Kristoffer Dalsgaard, Sukhodolsky Denis, Bikic Aida

    Published 2024-04-01
    “…Replicated evidence shows a weak or non-significant correlation between different methods of evaluating executive functions (EF). The current study investigates the association between rating scales and cognitive tests of EF in a sample of children with ADHD and executive dysfunction.…”
    Get full text
    Article
  14. 14

    A poem (A Message on the Night of Execution) by Hashem Al-Rifai, a critical psychological study by Ihsan Burhanuldeen Ameen

    Published 2023-10-01
    “… For the poet Hashem Al-RifaiThis research deals with the analysis of the poem "A Message on the Night of Execution" by the Egyptian poet Hashem Al-Rifai according to the psychological method. …”
    Get full text
    Article
  15. 15

    Machine Learning and Reverse Methods for a Deeper Understanding of Public Roadway Improvement Action Impacts during Execution by Sohrab Mamdoohi, Elise Miller-Hooks

    Published 2022-01-01
    “…Alternative hybrid machine-learning methods are proposed to identify and contrast those traffic characteristics that contribute greatest to correct detection of each type of downtime event. …”
    Get full text
    Article
  16. 16

    Method of diversity software protection based on fusion compilation by Xiaobing XIONG, Hui SHU, Fei KANG

    Published 2020-12-01
    “…For the obvious characteristics and single mode of the existing common protection methods,with the help of the LLVM framework,a diversity software protection method based on fusion compilation was proposed.In the proposed method,the target software is encrypted randomly,and deeply integrated with the bunker code at the compilation level,and the encrypted target software is decrypted by memory execution technology.Then it is executed in the form of no process in memory,and the diversified protection effect of the target software is realized by the diversity of the bunker and the randomness of the fusion strategies.A number of commonly used software are selected as the test case,and the proposed method is tested from the aspects of resource cost,protection effect,comparative experiment and so on.Compared with the traditional methods such as obfuscation and packing,the proposed method has great advantages in anti-static analysis and anti-dynamic debugging,and can effectively resist the mainstream methods of reverse analyzing and cracking.…”
    Get full text
    Article
  17. 17

    Program state optimal method based on variable symbolic relation analysis by Xi GUO, Pan WANG

    Published 2018-06-01
    “…Program analysis is the prime method to program property analysis,which is widely used in the domain of parameter dependent relation,path coverage and test case generation,and a lot of progress has been made.Current program analysis is based on the method of symbolic execution,but symbolic execution is usually tackled with the problems of logic expression generation of path condition and low efficiency of constrain solver,which will affect the results of program analysis.Aiming at enhancing the path analysis efficiency,the path conditions of different paths were collected,the common symbolic expression was extracted and the efficiency of symbolic analysis was enhanced,then the logic expression set was generated,the dependent relation algorithm was used to enhance the efficiency of symbolic analysis.Experimental results demonstrate that the proposed method has the advantages of accurate time complexity and better analysis efficiency compare to traditional program analysis method.…”
    Get full text
    Article
  18. 18
  19. 19

    Methodical Support for Conducting an Expert Research to Establish the Statute of Limitations for the Execution of Documents’ Requisites: Problems of Expert and Judicial Practice by M. V. Zhizhina, V. B. Danilovich

    Published 2022-01-01
    “…The article addresses the problems of methodical support for establishing the statute of limitations when conducting a forensic document examination, directly affecting the admissibility of an expert’s opinion as evidence in legal proceedings. …”
    Get full text
    Article
  20. 20

    Universal patching method for side-channel vulnerabilities based on atomic obfuscation by Deqing ZOU, Pan ZHANG, Wei LIU, Weijie CHEN, Yifan LU

    Published 2022-04-01
    “…Executing code containing side-channel vulnerabilities exhibits different non-functional behaviors related to inputs.Attackers can obtain these behaviors by leveraging micro architecture side-channel attacks and then analyze the pattern between the behaviors and the inputs to access sensitive data.Vulnerability repairing at the software layer brings low overheads to a program’s execution.Besides, it does not require modifying hardware or system, which enables fast patching and widespread deployment.It becomes the mainstream strategy applied to the current cryptographic implementations.However, existing solutions are deeply bound to the program’s implementation and requires manual intervention.This brings challenge to implement and is not versatile enough.A general patching method was proposed for side-channel vulnerabilities that combined dynamic obfuscated execution with hardware atomic transaction.To hide the real accesses of the side-channel vulnerabilities of a program, the proposed method inserted dynamic confusing accesses into the vulnerabilities.To avoid an attacker using fine-grained side-channel attack to distinguish the real access and the confusing access, both of them were encapsulated as transactions and they were guaranteed to be uninterrupted during the running period.In addition, a prototype system called SC-Patcher was implemented based on the LLVM compiler.Various optimization strategies were supported, including secure springboard and transaction aggregation, to further improve system security and performance.Experimental results show that the proposed method makes it impossible for an attacker to restore accurate sensitive data through side-channel attack, and it also brings almost no additional performance overhead to the program.…”
    Get full text
    Article