Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 5 of 311698 results
Sort by: relevance publication year

Steganography Technique with Huffman Code

JOURNAL ARTICLE published 27 August 2019 in International Journal of Recent Technology and Engineering

Formal Methods Meet Mobile Code Obfuscation Identification of Code Reordering Technique

PROCEEDINGS ARTICLE published June 2017 in 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)

Authors: Aniello Cimitile | Fabio Martinelli | Francesco Mercaldo | Vittoria Nardone | Antonella Santone

Analyzing Android Code Graphs against Code Obfuscation and App Hiding Techniques

JOURNAL ARTICLE published 2 October 2019 in Journal of Applied Security Research

Authors: Shikha Badhani | Sunil K. Muttoo

Generating Multi-Variant Java Source Code Using Generic Aspects

PROCEEDINGS ARTICLE published 2018 in Proceedings of the 6th International Conference on Model-Driven Engineering and Software Development

Authors: Sandra Greiner | Bernhard Westfechtel

Vom code galant zum code tendre

BOOK CHAPTER published 1998 in Querelles. Jahrbuch für Frauenforschung 1998

Authors: Roswitha Böhm

Creation and Analysis of QR Code

JOURNAL ARTICLE published 31 October 2016 in Bonfring International Journal of Software Engineering and Soft Computing

Authors: Sudeep S. Kulkarni | Chetna Malagi

L’Équilibre Fiscal en Matière du Code de Recouvrement des Créances Publiques = Fiscal Balance in Terms of the Public Debts Recovery Code

JOURNAL ARTICLE published March 2021 in المنارة للدراسات القانونية و الإدارية

Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis

PROCEEDINGS ARTICLE published 2018 in Proceedings of the 4th International Conference on Information Systems Security and Privacy

Authors: Alessandro Bacci | Alberto Bartoli | Fabio Martinelli | Eric Medvet | Francesco Mercaldo | Corrado Aaron Visaggio

Method for Detecting Javascript Code Obfuscation based on Convolutional Neural Network

JOURNAL ARTICLE published 2018 in International Journal of Performability Engineering

Authors: Wei Jiang

A Haskell to Java Virtual Machine code compiler

BOOK CHAPTER published 1998 in Implementation of Functional Languages

Authors: David Wakeling

Beginning Java Objects

BOOK published 2023

Authors: Jacquie Barker

The UNCTAD Liner Code: United States Maritime Policy at the Crossroads

BOOK published 11 July 2019

Authors: Juda Lawrence

Source code 5. Java routine for the SV diameter quantifications in random sections

COMPONENT published

A CASE tool platform using an XML representation of Java source code

PROCEEDINGS ARTICLE published in Source Code Analysis and Manipulation, Fourth IEEE International Workshop on

Authors: K. Maruyama | S. Yamamoto

Experimental Evaluation of Low Code development, Java Swing and JavaScript programming

PROCEEDINGS ARTICLE published 22 August 2022 in Proceedings of the 26th International Database Engineered Applications Symposium

Authors: André Calçada | Jorge Bernardino

Camouflage: Utility-Aware Obfuscation for Accurate Simulation of Sensitive Program Traces

JOURNAL ARTICLE published 29 February 2024 in ACM Transactions on Architecture and Code Optimization

Authors: Asmita Pal | Keerthana Desai | Rahul Chatterjee | Joshua San Miguel

Jumbo: run-time code generation for Java and its applications

PROCEEDINGS ARTICLE published in International Symposium on Code Generation and Optimization, 2003. CGO 2003.

Authors: S. Kamin | L. Clausen | A. Jarvis

Systematic exhortation of code smell detection using JSmell for java source code

PROCEEDINGS ARTICLE published January 2017 in 2017 International Conference on Inventive Systems and Control (ICISC)

Authors: M. Sangeetha | P. Sengottuvelan

Code Coverage Visualization on Web-Based Testing Tool for Java Programs

JOURNAL ARTICLE published 2015 in Journal of Robotics, Networking and Artificial Life

Authors: Mochamad Chandra Saputra | Tetsuro Katayama

On the robustness of clone detection to code obfuscation

PROCEEDINGS ARTICLE published May 2013 in 2013 7th International Workshop on Software Clones (IWSC)

Authors: Sandro Schulze | Daniel Meyer