期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
基于逆向分析的无源码软件故障诊断技术 被引量:1
1
作者 张晓东 孙锋 +1 位作者 王立冰 李华 《机电设备》 2012年第3期54-57,共4页
针对无源码软件故障诊断方法的技术难点和应用要求,提出了基于逆向分析的无源码软件故障诊断技术。通过对目标系统控制流和数据流等方面的分析,建立故障诊断模型。采用基于"伪断点"方式的自调试技术有效定位故障原因。结合破... 针对无源码软件故障诊断方法的技术难点和应用要求,提出了基于逆向分析的无源码软件故障诊断技术。通过对目标系统控制流和数据流等方面的分析,建立故障诊断模型。采用基于"伪断点"方式的自调试技术有效定位故障原因。结合破解技术,通过修改二进制程序或编写故障修正附加程序达到故障消除的目的。实践证明,该方法很好地解决了无源码软件装备的故障诊断问题。 展开更多
关键词 逆向分析 故障诊断 源码软件装备 破解技术
下载PDF
基于图神经网络的软件源码漏洞检测方法
2
作者 黄鹏宇 鞠亚军 《微型计算机》 2024年第9期28-30,共3页
本文提出了一种基于图神经网络的软件源码漏洞检测方法。该方法通过将源码转换为一个图结构,利用图神经网络的强大学习能力来识别和预测潜在的漏洞。实验结果表明,所提出的方法在准确率、召回率和F1值等指标上具有一定的优势,并且还提... 本文提出了一种基于图神经网络的软件源码漏洞检测方法。该方法通过将源码转换为一个图结构,利用图神经网络的强大学习能力来识别和预测潜在的漏洞。实验结果表明,所提出的方法在准确率、召回率和F1值等指标上具有一定的优势,并且还提供了漏洞解释和定位功能。通过与其他基于深度学习的漏洞检测方法进行对比,可以发现所提出的方法具有一定的竞争力。 展开更多
关键词 图神经网络 软件 漏洞检测方法
下载PDF
基于人机交互大数据的软件源码漏洞检测仿真
3
作者 赵焕平 薛党勤 尚展垒 《计算机仿真》 北大核心 2023年第11期388-392,465,共6页
为防止软件使用者受到不法侵害和个人信息泄露,研究基于人机交互大数据的软件源码漏洞检测仿真方法。创建包含三个模块的软件源码漏洞检测模型,将IE浏览器作为客户端软件,使用源码获取模块的网络爬虫算法获取客户端软件的可疑软件源码,... 为防止软件使用者受到不法侵害和个人信息泄露,研究基于人机交互大数据的软件源码漏洞检测仿真方法。创建包含三个模块的软件源码漏洞检测模型,将IE浏览器作为客户端软件,使用源码获取模块的网络爬虫算法获取客户端软件的可疑软件源码,生成可疑软件源码集合,利用源码主动访问模块的高交互式客户端蜜罐技术,主动访问集合内重要度较高的元素,构成可疑软件源码检测点集合,据其运用软件源码漏洞检测模块的混合深度学习模型,实现软件源码漏洞检测。实验结果表明,上述方法的可疑软件源码抓取效率较高,且抓取覆盖率始终高于95%;所提方法的软件源码漏洞检测个数和所处位置与实际结果完全吻合。 展开更多
关键词 人机交互 大数据 软件 漏洞检测仿真 网络爬虫 蜜罐技术
下载PDF
软件源码上的数据挖掘应用综述 被引量:1
4
作者 于秀梅 梁彬 陈红 《计算机应用》 CSCD 北大核心 2009年第9期2494-2498,2515,共6页
数据挖掘技术可以从大量的数据中发现某些有价值的知识。而将软件源码作为一种特殊的数据,在其上应用数据挖掘技术进行源码层次上的信息挖掘,已成为一个新颖而重要的课题。将对软件源码上的数据挖掘技术从各领域的应用、数据挖掘方法以... 数据挖掘技术可以从大量的数据中发现某些有价值的知识。而将软件源码作为一种特殊的数据,在其上应用数据挖掘技术进行源码层次上的信息挖掘,已成为一个新颖而重要的课题。将对软件源码上的数据挖掘技术从各领域的应用、数据挖掘方法以及当前发展水平等主要方面展开介绍,并详细剖析当前此领域的制约因素,提出未来此领域的发展方向。 展开更多
关键词 软件 数据挖掘 信息挖掘 挖掘
下载PDF
源码开放的嵌入式系统软件分析与实践(含光盘)——基于SkyEye和ARM开发平台
5
作者 陈渝 李明 杨晔 《单片机与嵌入式系统应用》 2004年第9期67-67,共1页
关键词 开放的嵌入式系统软件分析与实践-基于SkyEye和ARM开发平台》 陈渝 北京航空航天大学出版社 GPL协议 OPEN Source协议 开发工具
下载PDF
软件防破解实用方法分析与实现 被引量:4
6
作者 黄玉波 《计算机与现代化》 2008年第12期114-116,120,共4页
介绍常用软件加密和软件破解的一些方法。在分析它们的优缺点之后,提出了在源码级软件加密的一些策略,并成功应用在个人软件和商业软件中,获得良好效果。
关键词 加密 破解 源码软件 策略
下载PDF
运用SrvReport服务器远程监控Linux服务器
7
作者 蒋年华 《开放系统世界》 2004年第4期66-66,共1页
系统管理员不在机房时,如何继续对Linux服务器进行监控和管理,如何全面了解Linux服务器的运行状态,是系统管理员需要面对的问题。实现对Linux服务器远程管理和监控的方法很多,这里主要介绍使用SrvReport这款Linux专用远程监控软件,... 系统管理员不在机房时,如何继续对Linux服务器进行监控和管理,如何全面了解Linux服务器的运行状态,是系统管理员需要面对的问题。实现对Linux服务器远程管理和监控的方法很多,这里主要介绍使用SrvReport这款Linux专用远程监控软件,对Linux服务器进行远程监控管理。 展开更多
关键词 LINUX 操作系统 开发源码软件 服务器 SrvReport 远程监控
下载PDF
Reliability Evaluation Metrics for Open Source Software Selection 被引量:1
8
作者 Jing-shu JIN Hoo-jae LEE Sung-yul RHEW 《Journal of Measurement Science and Instrumentation》 CAS 2010年第3期281-284,共4页
Recently, Open Source Software (OSS) is so widely used not only by companies for development but also by common users instead of commercial software. However, the number of OSS is vast, and its quality varies from l... Recently, Open Source Software (OSS) is so widely used not only by companies for development but also by common users instead of commercial software. However, the number of OSS is vast, and its quality varies from low to high. So how people can evaluate OSS and ensta-e that it is reliable for use becomes necessary. This paper proposes a set of reliability evaluation metrics considering the states of OSS selected in the early stage. Understandability, Fault tolerance & Recoverability and Community Matmrity as sub-attributes of reliability are defined, and then several evaluation criteria for each of them are identified. A process of reliability evaluation in our study is proposed. For application, we select four OSS projects and evaluate them with our metrics. As a result of compadrison with other evaluation model for OSS, our research presents an easy, effective and trustworthy way for selecting a reliable OSS. 展开更多
关键词 OSS reliability enduation metric reliability evaluation
下载PDF
Digital Rights Management:Model,Technology and Application 被引量:7
9
作者 Zhaofeng Ma 《China Communications》 SCIE CSCD 2017年第6期156-167,共12页
with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced ... with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced in daily work,however to protect the content being copying,shared or deliberately stolen by inside or outside,digital rights management(DRM) became more and more important for digital content protection.In this paper,we studied various DRM model,technology and application,and first proposed DRM Security Infrastructure(DSI),in which we defined encryption,hash,signature algorithm,watermarking algorithms,authentication,usage control,trusted counter,conditional trace,secure payment,and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs,in which we proposed 6 typical classes of copyrights and content protection DRMs architecture:(1) Software-oriented DRM,(2) e Book-oriented DRM,(3) Video-oriented DRM,(4) Image-Oriented DRM(5) Unstructured data oriented DRM,(6) Text-oriented DRM.Based on the above DSI,we then proposed a dynamic DRM model selection method for various DRM application,which can be adapted dynamically for different technology of different applications,which can provide awhole solution for variant DRM development in a rapid and customized mode.The proposed DRM method,technology and application in this paper provided a common,flexible and extendable solution for variant DRM scenes,and can support rapid and customized development.Moreover,we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law,liberty and morality. 展开更多
关键词 digital rights management drm security infrastructure ENCRYPTION WATERMARK usage control drm-free
下载PDF
Metastasis and micrometastasis in ultra-low rectal cancer
10
作者 Xuefeng Guo Ping Lan Lei Wang Hui Peng Jianping Wang 《The Chinese-German Journal of Clinical Oncology》 CAS 2010年第9期524-527,共4页
Objective:The aim of our study was to investigate the lymph node metastasis of mesorectum and ischiorectal foss in ultra-low rectal cancer and its influence on the surgical procedure selection.Methods:Large slices and... Objective:The aim of our study was to investigate the lymph node metastasis of mesorectum and ischiorectal foss in ultra-low rectal cancer and its influence on the surgical procedure selection.Methods:Large slices and tissue microarray technology were used to detect metastasis lymph nodes from 23 dissected specimens of ultra-low rectal cancer.Results:415 lymph nodes were detected in the 23 specimens.169 and 59 lymph nodes were metastasis and micrometastasis, respectively.Twelve specimens were diagnosed with lymph node metastasis, while other 4 specimens were with lymph node micro-metastasis.There were 29.0% (49/169) and 17.2% (29/169) metastatic lymph nodes located in the outer and anterior region of mesorectum.There were 2 cases with ischiorectal fossa lymph node metastasis and 1 case with micrometastasis.The 3 metastatic cases were only 13% (13/23) of all the 23 cases.Conclusion:There is regional lymph node metastasis existing in ultra-low rectal cancer.The metastatic incidences in distal mesorectum and ischiorectal fossa are relatively low.Considering Miles operation as the standard surgical procedure for ultra-low rectal cancer should be evaluated renewedly. 展开更多
关键词 rectal neoplasm lymph nodes neoplasm metastasis
下载PDF
Empirical analysis of network measures for predicting high severity software faults 被引量:4
11
作者 Lin CHEN Wanwangying MA +4 位作者 Yuming ZHOU Lei XU Ziyuan WANG Zhifei CHEN Baowen XU 《Science China Earth Sciences》 SCIE EI CAS CSCD 2016年第12期198-215,共18页
Network measures are useful for predicting fault-prone modules. However, existing work has not distinguished faults according to their severity. In practice, high severity faults cause serious problems and require fur... Network measures are useful for predicting fault-prone modules. However, existing work has not distinguished faults according to their severity. In practice, high severity faults cause serious problems and require further attention. In this study, we explored the utility of network measures in high severity faultproneness prediction. We constructed software source code networks for four open-source projects by extracting the dependencies between modules. We then used univariate logistic regression to investigate the associations between each network measure and fault-proneness at a high severity level. We built multivariate prediction models to examine their explanatory ability for fault-proneness, as well as evaluated their predictive effectiveness compared to code metrics under forward-release and cross-project predictions. The results revealed the following:(1) most network measures are significantly related to high severity fault-proneness;(2) network measures generally have comparable explanatory abilities and predictive powers to those of code metrics; and(3) network measures are very unstable for cross-project predictions. These results indicate that network measures are of practical value in high severity fault-proneness prediction. 展开更多
关键词 network measures high severity fault-proneness fault prediction software metrics
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部