Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 7,412
1.
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
2.
  • DeepWukong DeepWukong
    Cheng, Xiao; Wang, Haoyu; Hua, Jiayi ... ACM transactions on software engineering and methodology, 05/2021, Volume: 30, Issue: 3
    Journal Article
    Peer reviewed

    Static bug detection has shown its effectiveness in detecting well-defined memory errors, e.g., memory leaks, buffer overflows, and null dereference. However, modern software systems have a wide ...
Full text
Available for: NUK, UL
3.
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
4.
  • A Survey of Symbolic Execut... A Survey of Symbolic Execution Techniques
    Baldoni, Roberto; Coppa, Emilio; D’elia, Daniele Cono ... ACM computing surveys, 05/2019, Volume: 51, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Many security and software testing applications require checking whether certain properties of a program hold for any possible usage scenario. For instance, a tool for identifying software ...
Full text
Available for: IZUM, KILJ, NUK, PILJ, SAZU, UL, UM, UPUK

PDF
5.
  • Static bending analysis of ... Static bending analysis of beams made of functionally graded porous materials
    Zghal, Souhir; Ataoui, Dhia; Dammak, Fakhreddine Mechanics based design of structures and machines, 03/2022, Volume: 50, Issue: 3
    Journal Article
    Peer reviewed

    This paper constitutes a first attempt to explore the influence of porosity on bending static analysis of functionally graded (FG) beams using a refined mixed finite element beam model. The material ...
Full text
Available for: BFBNIB, DOBA, GIS, IJS, IZUM, KILJ, KISLJ, NUK, PILJ, PNG, SAZU, UILJ, UKNU, UL, UM, UPUK
6.
  • Survey of techniques to det... Survey of techniques to detect common weaknesses in program binaries
    Adhikari, Ashish; Kulkarni, Prasad Cyber Security and Applications, December 2025, 2025-12-00, Volume: 3
    Journal Article
    Peer reviewed
    Open access

    Software vulnerabilities resulting from coding weaknesses and poor development practices are common. Attackers can exploit these vulnerabilities and impact the security and privacy of end-users. Most ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
7.
  • DL-Droid: Deep learning bas... DL-Droid: Deep learning based android malware detection using real devices
    Alzaylaee, Mohammed K.; Yerima, Suleiman Y.; Sezer, Sakir Computers & security, February 2020, 2020-02-00, 20200201, Volume: 89
    Journal Article
    Peer reviewed
    Open access

    The Android operating system has been the most popular for smartphones and tablets since 2012. This popularity has led to a rapid raise of Android malware in recent years. The sophistication of ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP

PDF
8.
  • A critical review of recent... A critical review of recent research on functionally graded plates
    Jha, D.K.; Kant, Tarun; Singh, R.K. Composite structures, February 2013, 2013-02-00, Volume: 96
    Journal Article
    Peer reviewed

    In view of the significant increase in research activity and publications in functionally graded materials (FGMs) and structures in the last few years, the present article is an attempt to identify ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
9.
  • Reducing the Impact of Time... Reducing the Impact of Time Evolution on Source Code Authorship Attribution via Domain Adaptation
    Li, Zhen; Zhao, Shasha; Chen, Chen ... ACM transactions on software engineering and methodology, 07/2024, Volume: 33, Issue: 6
    Journal Article
    Peer reviewed
    Open access

    Source code authorship attribution is an important problem in practical applications such as plagiarism detection, software forensics, and copyright disputes. Recent studies show that existing ...
Full text
Available for: NUK, UL
10.
  • SmartCheck SmartCheck
    Tikhomirov, Sergei; Voskresenskaya, Ekaterina; Ivanitskiy, Ivan ... 2018 IEEE/ACM 1st International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), 05/2018
    Conference Proceeding

    Ethereum is a major blockchain-based platform for smart contracts - Turing complete programs that are executed in a decentralized network and usually manipulate digital units of value. Solidity is ...
Full text
Available for: IJS, NUK, UL, UM
1 2 3 4 5
hits: 7,412

Load filters