共 50 条
- [41] A CASE tool platform - Using an XML representation of Java']Java source code FOURTH IEEE INTERNATIONAL WORKSHOP ON SOURCE CODE ANALYSIS AND MANIPULATION, PROCEEDINGS, 2004, : 158 - 167
- [42] BejaGNN: behavior-based Java malware detection via graph neural network The Journal of Supercomputing, 2023, 79 : 15390 - 15414
- [43] A resource management system for network computing using Java']Java PROCEEDINGS OF THE FIFTH JOINT CONFERENCE ON INFORMATION SCIENCES, VOLS 1 AND 2, 2000, : 453 - 456
- [44] Network and web services security concepts using Java']Java FIRST LATIN AMERICAN WEB CONGRESS, PROCEEDINGS, 2003, : 238 - 238
- [45] Enhanced Graph Neural Networks for Vulnerability Detection in Java']Java via Advanced Subgraph Construction TESTING SOFTWARE AND SYSTEMS, ICTSS 2024, 2025, 15383 : 131 - 148
- [46] Graph representation learning and software homology matching based A study of JAVA']JAVA code vulnerability detection techniques 2023 2ND ASIA CONFERENCE ON ALGORITHMS, COMPUTING AND MACHINE LEARNING, CACML 2023, 2023, : 131 - 142
- [47] Teaching network performance measurement using Java']Java when the students don't already know Java']Java INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, PROCEEDINGS, 1999, : 74 - 80
- [48] The Integration Platform Development Of System Code for CFETR Using Java']Java, MYSQL and Optimus 2015 IEEE 26TH SYMPOSIUM ON FUSION ENGINEERING (SOFE), 2015,
- [50] Preventing reverse engineering threat in Java']Java using byte code obfuscation techniques SECOND INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES 2006, PROCEEDINGS, 2006, : 689 - +