Search is not available for this dataset
query
stringlengths 1
13.4k
| pos
stringlengths 1
61k
| neg
stringlengths 1
63.9k
| query_lang
stringclasses 147
values | __index_level_0__
int64 0
3.11M
|
|---|---|---|---|---|
Refactoring programs to secure information flows
|
Evolving object-oriented designs with refactorings
|
Object existence probability fusion using dempster-shafer theory in a high-level sensor data fusion architecture
|
eng_Latn
| 4,700
|
Principles of Layered Attestation
|
Linux kernel integrity measurement using contextual inspection
|
Towards a Taxonomy of Bad Smells Detection Approaches
|
eng_Latn
| 4,701
|
Robust Hashing for Image-based Malware Classification
|
Malware detection based on opcode frequency
|
A cortical representation of the local visual environment
|
eng_Latn
| 4,702
|
An AST-based Code Plagiarism Detection Algorithm
|
Clone detection using abstract syntax trees
|
Numerical analysis of the SF6 dielectric recovery in high voltage circuit-breakers around current zero
|
eng_Latn
| 4,703
|
A compiler-level intermediate representation based binary analysis and rewriting system
|
efficient , transparent , and comprehensive runtime code manipulation .
|
A decision procedure for bit-vectors and arrays
|
eng_Latn
| 4,704
|
An Alternative to NCD for Large Sequences, Lempel-Ziv Jaccard Distance
|
Evaluation of malware phylogeny modelling systems using automated variant generation
|
the elements of statistical learning : data mining , inference , and prediction , 2nd edition .
|
eng_Latn
| 4,705
|
Malware detection based on opcode frequency
|
In-execution dynamic malware analysis and detection by mining information in process control blocks of Linux OS
|
TextBoxes++: A Single-Shot Oriented Scene Text Detector
|
eng_Latn
| 4,706
|
Proposal Techniques and Solutions for Addressing Ransomware Attacks
|
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook
|
Visual cues can modulate integration and segregation of objects in auditory scene analysis
|
eng_Latn
| 4,707
|
branch prediction and the performance of interpreters — don ' t trust folklore .
|
Pin: building customized program analysis tools with dynamic instrumentation
|
Points-to analysis for JavaScript
|
eng_Latn
| 4,708
|
DexLego: Reassembleable Bytecode Extraction for Aiding Static Analysis
|
Automated concolic testing of smartphone apps
|
Embedded reconfigurable logic for ASIC design obfuscation against supply chain attacks
|
eng_Latn
| 4,709
|
Model-Driven Engineering as a new landscape for traceability management: A systematic literature review
|
Model Driven Engineering
|
Secure Virtual Machine Execution under an Untrusted Management OS
|
eng_Latn
| 4,710
|
Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities
|
Detecting Environment-Sensitive Malware
|
Oil Biodegradation and Bioremediation: A Tale of the Two Worst Spills in U.S. History
|
eng_Latn
| 4,711
|
Integrity-Based Kernel Malware Detection
|
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence
|
Anatomy of the Midface
|
eng_Latn
| 4,712
|
Defining metrics for continuous delivery and deployment pipeline
|
On the journey to continuous deployment: technical and social challenges along the way
|
Deobfuscation: Improving reverse engineering of obfuscated code
|
eng_Latn
| 4,713
|
analysis of a software product line architecture : an experience report .
|
Scenario-Based Analysis of Software Architecture
|
Architecting a common-source-line array for bipolar non-volatile memory devices
|
eng_Latn
| 4,714
|
An entropy-based distance measure for analyzing and detecting metamorphic malware
|
MEDUSA: MEtamorphic malware dynamic analysis usingsignature from API
|
Attachment style
|
eng_Latn
| 4,715
|
Covert channels using mobile device's magnetic field sensors
|
A Practical Methodology for Measuring the Side-Channel Signal Available to the Attacker for Instruction-Level Events
|
An Ontological Analysis of Value Propositions
|
eng_Latn
| 4,716
|
Forensic Zero-Knowledge Event Reconstruction on Filesystem Metadata.
|
Binary Codes Capable of Correcting Deletions, Insertions and Reversals
|
A second generation computer forensic analysis system
|
deu_Latn
| 4,717
|
On the feasibility of online malware detection with performance counters
|
Automated classification and analysis of internet malware
|
the sustainability balanced scorecard – linking sustainability management to business strategy .
|
eng_Latn
| 4,718
|
A course-based usability analysis of Cilk Plus and OpenMP
|
Capturing and analyzing low-level events from the code editor
|
Securing DNP3 Broadcast Communications in SCADA Systems
|
eng_Latn
| 4,719
|
Comparing static bug finders and statistical prediction
|
Sound and precise analysis of web applications for injection vulnerabilities
|
Flow cytometry combined with viSNE for the analysis of microbial biofilms and detection of microplastics
|
eng_Latn
| 4,720
|
RADAR: an in-building RF-based user location and tracking system
|
The X-tree : An Index Structure for High-Dimensional Data
|
Security Patterns from Intelligent Data: A Map of Software Vulnerability Analysis
|
eng_Latn
| 4,721
|
Query optimization of distributed pattern matching
|
Matching Structure and Semantics: A Survey on Graph-Based Pattern Matching
|
GPLAG: detection of software plagiarism by program dependence graph analysis
|
eng_Latn
| 4,722
|
Low-level software security: Attacks and defenses
|
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
|
Fuzz Revisited: A Re-examination of the Reliability of UNIX Utilities and Services
|
eng_Latn
| 4,723
|
An undergraduate course on software bug detection tools and techniques
|
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
|
How to share a secret
|
eng_Latn
| 4,724
|
Malware Characterization Using WindowsAPI Call Sequences
|
Malware Analysis and Classification: A Survey
|
On the Optimality of the Simple Bayesian Classifier under Zero-One Loss
|
kor_Hang
| 4,725
|
Applying Memory Forensics to Rootkit Detection
|
Cloaker: Hardware Supported Rootkit Concealment
|
Call center performance evaluation using big data analytics
|
eng_Latn
| 4,726
|
Efficient SIMD code generation for runtime alignment and length conversion
|
Automatic Intra-Register Vectorization for the Intel® Architecture
|
Oows: A method to develop web applications from web-oriented conceptual models
|
eng_Latn
| 4,727
|
Optimized invariant representation of network traffic for detecting unseen malware variants
|
Automatic Generation of String Signatures for Malware Detection
|
Clustering small-sized collections of short texts
|
eng_Latn
| 4,728
|
On Reverse Engineering-Based Hardware Trojan Detection
|
A Survey of Hardware Trojan Taxonomy and Detection
|
The role of double-strand break repair — insights from human genetics
|
eng_Latn
| 4,729
|
Efficient validation input generation in RTL by hybridized source code analysis
|
A System to Generate Test Data and Symbolically Execute Programs
|
Rigel: an architecture and scalable programming interface for a 1000-core accelerator
|
eng_Latn
| 4,730
|
Malware Classification Using N-grams Sequential Pattern Features
|
C4.5: Programs for Machine Learning
|
A Taxonomy of Obfuscating Transformations
|
eng_Latn
| 4,731
|
control - flow integrity .
|
Address obfuscation: an efficient approach to combat a broad range of memory error exploits
|
A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise
|
eng_Latn
| 4,732
|
Cognitive modeling of polymorphic malware using fractal based semantic characterization
|
Panorama: capturing system-wide information flow for malware detection and analysis
|
Evaluation of medicated feeds with antiparasitical and immune-enhanced Chinese herbal medicines against Ichthyophthirius multifiliis in grass carp (Ctenopharyngodon idellus)
|
eng_Latn
| 4,733
|
Hunting the Ethereum Smart Contract: Color-inspired Inspection of Potential Attacks
|
Formal Verification of Smart Contracts: Short Paper
|
Formalizing the LLVM intermediate representation for verified program transformations
|
eng_Latn
| 4,734
|
Dead Code Detection Method Based on Program Slicing
|
Deobfuscation: reverse engineering obfuscated code
|
Large Scale URL-based Classification Using Online Incremental Learning
|
eng_Latn
| 4,735
|
Monotonic models for real-time dynamic malware detection
|
Malicious Behavior Detection using Windows Audit Logs
|
C20orf20 (MRG-binding protein) as a potential therapeutic target for colorectal cancer
|
eng_Latn
| 4,736
|
On the Relation between External Software Quality and Static Code Analysis
|
A METRICS SUITE FOR OBJECT ORIENTED DESIGN
|
New sampling formulae for non-bandlimited signals associated with linear canonical transform and nonlinear Fourier atoms
|
eng_Latn
| 4,737
|
Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM
|
G-Free: defeating return-oriented programming through gadget-less binaries
|
The Economic Impact of Helmet Use on Motorcycle Accidents: A Systematic Review and Meta-analysis of the Literature from the Past 20 Years
|
eng_Latn
| 4,738
|
An Architectural Smells Detection Tool for C and C++ Projects
|
Hotspot Patterns: The Formal Definition and Automatic Detection of Architecture Smells
|
Measuring Relational Aggression in Middle Childhood in a Multi-Informant Multi-Method Study
|
eng_Latn
| 4,739
|
doppelganger : a cache for approximate computing .
|
Pin: building customized program analysis tools with dynamic instrumentation
|
Using Software Non-Functional Assessment Process to Complement Function Points for Software Maintenance
|
eng_Latn
| 4,740
|
Comparing the effectiveness of commercial obfuscators against MATE attacks
|
Watermarking, Tamper-Proofing, and Obfuscation -- Tools for Software Protection
|
Solving Cryptarithmetic Problems Using Parallel Genetic Algorithm
|
eng_Latn
| 4,741
|
Transparent Protection of Commodity OS Kernels Using Hardware Virtualization
|
Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms
|
Using DNA to program the self-assembly of colloidal nanoparticles and microparticles
|
eng_Latn
| 4,742
|
QuickFuzz: an automatic random fuzzer for common file formats
|
Grammar-based whitebox fuzzing
|
Generic Application-Level Protocol Analyzer and its Language
|
eng_Latn
| 4,743
|
SAFEDISPATCH: Securing C++ Virtual Calls from Memory Corruption Attacks
|
CCured in the real world
|
intelligent evolutionary design : a new approach to optimizing complex engineering systems and its application to designing heat exchangers .
|
kor_Hang
| 4,744
|
An Introduction to Verification of Visualization Techniques
|
seL4: formal verification of an OS kernel
|
Terra: a virtual machine-based platform for trusted computing
|
kor_Hang
| 4,745
|
Evolution of evasive malwares: A survey
|
SubVirt: implementing malware with virtual machines
|
Radar Emitter Recognition in Airborne RWR/ESM Based on Improved K Nearest Neighbor Algorithm
|
eng_Latn
| 4,746
|
BinPro: A tool for binary backdoor accountability in code audits
|
Blanket execution: dynamic similarity testing for program binaries and components
|
The Genomic Landscape of Response to EGFR Blockade in Colorectal Cancer
|
eng_Latn
| 4,747
|
Securing web application code by static analysis and runtime protection
|
Flow-sensitive type qualifiers
|
A Phosphate-Binding Pocket within the Platform-PAZ-Connector Helix Cassette of Human Dicer.
|
eng_Latn
| 4,748
|
An Empirical Study on Detecting and Fixing Buffer Overflow Bugs
|
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
|
DLR-Hand II: next generation of a dextrous robot hand
|
eng_Latn
| 4,749
|
A heuristic approach for detection of obfuscated malware
|
A semantics-based approach to malware detection
|
A framework of mobile transaction use : the user's perspective
|
eng_Latn
| 4,750
|
Deobfuscation of Virtualization-Obfuscated Code Through Symbolic Execution and Compilation Optimization
|
Automatic Reverse Engineering of Malware Emulators
|
Sketch2normal: deep networks for normal map generation
|
eng_Latn
| 4,751
|
TypeSan: Practical Type Confusion Detection
|
control - flow integrity .
|
Efficient software-based fault isolation
|
eng_Latn
| 4,752
|
AEG: Automatic Exploit Generation
|
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
|
Scalable, Behavior-Based Malware Clustering
|
kor_Hang
| 4,753
|
Deep Analysis of Binary Code to Recover Program Structure
|
BAP: A Binary Analysis Platform
|
Designing Business Models for the Internet of Things
|
kor_Hang
| 4,754
|
Modelling Slotted-ALOHA Simulator Using Computational Spreadsheet Based e-Forms
|
The mole concept using MS Excel
|
Hardware-software integrated approaches to defend against software cache-based side channel attacks
|
kor_Hang
| 4,755
|
Three control flow obfuscation methods for Java software
|
Manufacturing cheap, resilient, and stealthy opaque constructs
|
Software Structure Metrics Based on Information Flow
|
eng_Latn
| 4,756
|
portable and efficient auto - vectorized bytecode : a look at the interaction between static and jit compilers .
|
Split Compilation: an Application to Just-in-Time Vectorization
|
Functions and mechanisms of epigenetic inheritance in animals
|
eng_Latn
| 4,757
|
Annotated Control Flow Graph for Metamorphic Malware Detection
|
Dynamic malware detection using registers values set analysis
|
Obfuscation of executable code to improve resistance to static disassembly
|
eng_Latn
| 4,758
|
defis de la securite de l ' information . support a la gestion des risques de securite par les modeles .
|
Using abuse case models for security requirements analysis
|
Defeating return-oriented rootkits with "Return-Less" kernels
|
fra_Latn
| 4,759
|
learning physical dynamics .
|
terpret : a probabilistic programming language for program induction .
|
Virtual ghost: protecting applications from hostile operating systems
|
eng_Latn
| 4,760
|
Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis
|
A Survey of Hardware Trojan Taxonomy and Detection
|
Malaysian Car Number Plate Detection System Based on Template Matching and Colour Information
|
eng_Latn
| 4,761
|
Identification of Refused Bequest Code Smells
|
design patterns : elements of reusable object - oriented software .
|
Precocious Puberty
|
eng_Latn
| 4,762
|
Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software
|
Address obfuscation: an efficient approach to combat a broad range of memory error exploits
|
CRITICAL SUCCESS FACTORS FOR DATA WAREHOUSING: A CLASSIC ANSWER TO A MODERN QUESTION
|
eng_Latn
| 4,763
|
Extracting Conditional Formulas for Cross-Platform Bug Search
|
Leveraging semantic signatures for bug search in binary programs
|
Detecting bad smells in source code using change history information
|
eng_Latn
| 4,764
|
Who Wrote This Code? Identifying the Authors of Program Binaries
|
Winnowing: local algorithms for document fingerprinting
|
SERT and NET occupancy by venlafaxine and milnacipran in nonhuman primates: a PET study
|
eng_Latn
| 4,765
|
Logical Attacks on Secured Containers of the Java Card Platform
|
Developing a Trojan applets in a smart card
|
Video summarization: techniques and classification
|
eng_Latn
| 4,766
|
Malware Analysis using Multiple API Sequence Mining Control Flow Graph
|
IMDS: intelligent malware detection system
|
The Influence of Carbon Dioxide on Brain Activity and Metabolism in Conscious Humans
|
eng_Latn
| 4,767
|
Toward the efficient use of multiple explicitly managed memory subsystems
|
dynamic binary analysis and instrumentation .
|
The Emergence of Canalization and Evolvability in an Open-Ended, Interactive Evolutionary System
|
eng_Latn
| 4,768
|
Security Analysis of PHP Bytecode Protection Mechanisms
|
Obfuscation of executable code to improve resistance to static disassembly
|
Do Energy Efficiency Investments Deliver at the Right Time
|
kor_Hang
| 4,769
|
Architectural Data Flow Analysis
|
Challenges in Secure Software Evolution - The Role of Software Architecture
|
A New Calibration Method for Current and Voltage Sensors Used in Power Quality Measurements
|
kor_Hang
| 4,770
|
A Survey of Prevention/Mitigation against Memory Corruption Attacks
|
AddressSanitizer : A Fast Address Sanity Checker
|
CLOPE: a fast and effective clustering algorithm for transactional data
|
eng_Latn
| 4,771
|
Selecting a set of appropriate metrics for detecting code clones
|
Substring matching for clone detection and change tracking
|
RacerX: effective, static detection of race conditions and deadlocks
|
eng_Latn
| 4,772
|
Probfuscation: An Obfuscation Approach Using Probabilistic Control Flows
|
Exploring Multiple Execution Paths for Malware Analysis
|
Automated classification and analysis of internet malware
|
kor_Hang
| 4,773
|
Dynamic Malware Detection Using API Similarity
|
Malware Detection Using Dynamic Birthmarks
|
Neurofeedback for the treatment of schizophrenia: Case study
|
eng_Latn
| 4,774
|
Detection of Metamorphic Malware based on HMM: A Hierarchical Approach
|
A tutorial on hidden Markov models and selected applications in speech recognition
|
Opcode graph similarity and metamorphic detection
|
eng_Latn
| 4,775
|
Applying Memory Forensics to Rootkit Detection
|
Cloaker: Hardware Supported Rootkit Concealment
|
A Virtual Machine Introspection Based Architecture for Intrusion Detection
|
eng_Latn
| 4,776
|
Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information
|
A General Method Applicable to the Search for Similarities in the Amino Acid Sequence of Two Proteins
|
Predictors of physical restraint use in Canadian intensive care units
|
eng_Latn
| 4,777
|
A malware detection system based on intermediate language
|
Polymorphic Malware Detection Using Sequence Classification Methods
|
Communication Needs of Elderly at Risk of Falls and their Remote Family
|
eng_Latn
| 4,778
|
Transparent Runtime Shadow Stack: Protection against malicious return address modifications
|
A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention
|
A Multi-objective Framework for Location Recommendation Based on User Preference
|
eng_Latn
| 4,779
|
Combining static and dynamic analysis for the detection of malicious documents
|
Toward Automated Dynamic Malware Analysis Using CWSandbox
|
A Semantic Model for Information Sharing in Autonomous Vehicle Systems
|
eng_Latn
| 4,780
|
Generalized vulnerability extrapolation using abstract syntax trees
|
Pixy: a static analysis tool for detecting Web application vulnerabilities
|
Why is Speech Recognition Difficult?
|
eng_Latn
| 4,781
|
An Eclipse plug-in for Test-to-Code Traceability Recovery
|
Program slicing: methods and applications
|
Applications of approximation algorithms to cooperative games
|
kor_Hang
| 4,782
|
Graph-based malware detection using dynamic analysis
|
Learning and Classification of Malware Behavior
|
Inferring Cognitive Models from Data using Approximate Bayesian Computation
|
eng_Latn
| 4,783
|
Design and Implementation of SecPod, A Framework for Virtualization-Based Security Systems
|
ATRA: Address Translation Redirection Attack against Hardware-based External Monitors
|
Similarity in Semantic Graphs: Combining Structural, Literal, and Ontology-based Measures
|
eng_Latn
| 4,784
|
Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis
|
Design Study Methodology: Reflections from the Trenches and the Stacks
|
EEG theta/beta ratio in relation to fear-modulated response-inhibition, attentional control, and affective traits
|
eng_Latn
| 4,785
|
Dynamically Translating x86 to LLVM using QEMU
|
Selective Symbolic Execution
|
Automated Whitebox Fuzz Testing
|
eng_Latn
| 4,786
|
Improving malware detection time by using RLE and N-gram
|
Approximate graph edit distance computation by means of bipartite graph matching
|
An analytical model for predicting the remaining battery capacity of lithium-ion batteries
|
eng_Latn
| 4,787
|
The power of the dinur-nissim algorithm: breaking privacy of statistical and graph databases
|
Privacy Preserving Data Mining
|
An efficient and generic reversible debugger using the virtual machine based approach
|
eng_Latn
| 4,788
|
A case study on the relationship between code ownership and refactoring activities in a Java software system
|
Template-based reconstruction of complex refactorings
|
Simulation of ion implantation for CMOS 1µm using SILVACO tools
|
eng_Latn
| 4,789
|
First-Order Bayesian Logic
|
A Language and Program for Complex Bayesian Modelling
|
K-Tracer: A System for Extracting Kernel Malware Behavior
|
kor_Hang
| 4,790
|
A Knowledge-Assisted Visual Malware Analysis System: Design, Validation, and Reflection of KAMAS
|
about face 3 : the essentials of interaction design .
|
Engineered nanomaterials for water treatment and remediation: Costs, benefits, and applicability
|
kor_Hang
| 4,791
|
Who Wrote This Code? Identifying the Authors of Program Binaries
|
Malware phylogeny generation using permutations of code
|
Efficient randomized pattern-matching algorithms
|
eng_Latn
| 4,792
|
Ensuring operating system kernel integrity with OSck
|
Non-control-data attacks are realistic threats
|
A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors
|
eng_Latn
| 4,793
|
ANOMALY DETECTION ALGORITHMS IN BUSINESS PROCESS LOGS
|
Graph-based anomaly detection
|
A Comparison of Static Analysis Tools for Vulnerability Detection in C / C + + Code
|
yue_Hant
| 4,794
|
APISan: Sanitizing {API} Usages through Semantic Cross-Checking
|
Automatic Inference of Search Patterns for Taint-Style Vulnerabilities
|
2Vrms 16Ω switching headphone driver with 82% peak efficiency, 102 dB SNDR and 1.1mA/channel quiescent current
|
eng_Latn
| 4,795
|
CRAX: Software Crash Analysis for Automatic Exploit Generation by Modeling Attacks as Symbolic Continuations
|
BitBlaze: A new approach to computer security via binary analysis
|
Advanced Compiler Design and Implementation
|
kor_Hang
| 4,796
|
On the Feasibility of Malware Authorship Attribution
|
refactoring improving the design of existing code .
|
Image Completion Approaches Using the Statistics of Similar Patches
|
eng_Latn
| 4,797
|
RainbowNet : Color Extrapolation from Grayscale Images
|
Colorful Image Colorization
|
dynamic software birthmarks to detect the theft of windows applications .
|
eng_Latn
| 4,798
|
CPAchecker: A Tool for Configurable Software Verification
|
The SLAM project: debugging system software via static analysis
|
The Distributed Nature of Working Memory
|
eng_Latn
| 4,799
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.