Font Size: a A A
Keyword [Bytecode]
Result: 41 - 60 | Page: 3 of 4
41. Design And Implementation Of Dual Interface JavaCard Virtual Machine
42. The Dalvik Obfuscation Technology For Android Applications
43. Research And Implementation Of Application Performance Management Based On Android
44. Research And Analysis Based Combined Attack On Java Card
45. Research And Implementation Of Obfuscated Drive By Download Attack Detection Technology
46. A Novel Permission Control System For Sensitive Resources On Android Platform
47. A Study On Webshell Detection Model Based On Machine Learning
48. Reproducible Android Application Interference Testing And Quality Improvement Method
49. Ethereum Smart Contract Optimization And Transaction Network Security Analysis
50. Code Clone Detection Based On Sequence Alignment And Deep Learning
51. Research On Energy Bug Judgment For Android Applications
52. Design and Analysis of Mobile Operating System Security Architecture using Formal Method
53. Bytecode-based Multiple Condition Coverage: An Initial Investigatio
54. Formal specification and verification of a JVM and its bytecode verifier
55. Efficient bytecode verification and compilation in a virtual machine
56. An Attempted Proof with Modular ACL2: Soundness of the Racket Bytecode Verifier
57. Architecture, implementation, and applications of bytecode transformation
58. Formalizing Java bytecode verifier using Z
59. Type systems for object-oriented intermediate languages
60. Soot: A Java bytecode optimization framework
  <<First  <Prev  Next>  Last>>  Jump to