Suggested Topics within your search.
Suggested Topics within your search.
-
41by D. S. Silnov“...A special mechanism of signature method while detecting virus signatures in binary files...”
Published 2012-12-01
Get full text
Article -
42“.... It is not suitable the honeypot malware that are mostly mixed with source code and binary files. Therefore, it still...”
Get full text
Others -
43“..., and saves these raw data into binary files. Step 3. the computer uses the Nfdump to read the binary files...”
Get full text
Others -
44by Y. Khmelevsky“... binary files, such as images, sound files, movies, special binary files in order to improve maintenance...”
Published 2008-12-01
Get full text
Article -
45“...) and 12 older (66–79 years) healthy adults. The data are in the form of MATLAB binary files with a freely...”
Get full text
Article -
46“... (soft sphere model with inverse-power-law potential), specific for the liquid metals. New binary files...”
Get full text
Article -
47by Juan Souteras, Andrés Flevaris, Germán Gadea, Sergio Nesmachnow, Alejandro Guitiérrez, Gabriel Cazes“... imagery in binary files. The algorithm was designed to update at global scale the land cover information...”
Published 2012-12-01
Get full text
Article -
48Convolutional Neural Network-Based Cryptography Ransomware Detection for Low-End Embedded Processors“...) platforms. We extract the sequence and frequency characteristics from the opcode of binary files for the 8...”
Get full text
Article -
49Published 2007-01-01“.... Such information may be communicated in the form of text, binary files, or provide additional information about...”
Get full text
Article -
50
-
51by Aruna Jayasena“...This tool can generate binary files for Xilinx FPGAs for “Stereo Vision-based disparity generation...”
Published 2021-07-01
Get full text
Article -
52by Zhang, Hanyu“... software dependency from a specific source, including source code, build scripts, binary files, and Debian...”
Published 2011
Get full text
-
53“..., capable of processing big binary files. Its implementation has been parallelized, providing important...”
Get full text
Article -
54“...The quality of anti-virus software relies on simple patterns extracted from binary files. Although...”
Get full text
Article -
55by Jones, Greg, 1963-2017.“...-bit combinations to be made available for 8-bit data translation. Since 8-bit data (i.e. binary files...”
Published 1991
Get full text
Others -
56“...Malicious binary files are a serious threat to industrial information systems. Because...”
Get full text
Article -
57“... executable binary files for all major operating systems, including Windows, Linux, and Mac OSX, and can...”
Get full text
Article -
58“... as binary files and the other artifact is the EXIF header of the images that are captured by UAV's onboard...”
Get full text
Article -
59“... two methods: Packaging binary files into SOAP messages, and using POST method of REST architecture...”
Get full text
Others -
60by Slawomir T. Wierzchon“.... computer programs/viruses are binary files). Now the problem can be stated as follows: given a set of self...”
Published 2000-10-01
Get full text
Article