Filtros : "Noruega" "EACH-SIN-86" "EACH" Removidos: "Indexado no PubMed" "Magalhães, Valéria Barbosa de" "EP-PRO" "FANTINATO, MARCELO" "Lituânia" "2012" "2019" "Boletim de Políticas Públicas" Limpar

Filtros



Limitar por data


  • Fonte: Information and Software Technology. Unidade: EACH

    Assuntos: COMPUTAÇÃO EVOLUTIVA, ALGORITMOS GENÉTICOS, APRENDIZADO COMPUTACIONAL

    Acesso à fonteDOIComo citar
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      CAMPOS, José et al. An empirical evaluation of evolutionary algorithms for unit test suite generation. Information and Software Technology, v. 104, p. 207-235, 2018Tradução . . Disponível em: https://doi.org/10.1016/j.infsof.2018.08.010. Acesso em: 11 out. 2024.
    • APA

      Campos, J., Ge, Y., Albunian, N., Fraser, G., Eler, M. M., & Arcuri, A. (2018). An empirical evaluation of evolutionary algorithms for unit test suite generation. Information and Software Technology, 104, 207-235. doi:10.1016/j.infsof.2018.08.010
    • NLM

      Campos J, Ge Y, Albunian N, Fraser G, Eler MM, Arcuri A. An empirical evaluation of evolutionary algorithms for unit test suite generation [Internet]. Information and Software Technology. 2018 ; 104 207-235.[citado 2024 out. 11 ] Available from: https://doi.org/10.1016/j.infsof.2018.08.010
    • Vancouver

      Campos J, Ge Y, Albunian N, Fraser G, Eler MM, Arcuri A. An empirical evaluation of evolutionary algorithms for unit test suite generation [Internet]. Information and Software Technology. 2018 ; 104 207-235.[citado 2024 out. 11 ] Available from: https://doi.org/10.1016/j.infsof.2018.08.010
  • Fonte: International Journal of Systems and Software Security and Protection. Unidade: EACH

    Assuntos: DESENVOLVIMENTO DE SOFTWARE, VULNERABILIDADE, SEGURANÇA DE SOFTWARE

    Acesso à fonteDOIComo citar
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      CHAIM, Marcos Lordello e SANTOS, Daniel Soares e CRUZES, Daniela Soares. What do we know about buffer overflow detection?. International Journal of Systems and Software Security and Protection, v. 9, n. 3, p. 01-33, 2018Tradução . . Disponível em: https://doi.org/10.4018/IJSSSP.2018070101. Acesso em: 11 out. 2024.
    • APA

      Chaim, M. L., Santos, D. S., & Cruzes, D. S. (2018). What do we know about buffer overflow detection? International Journal of Systems and Software Security and Protection, 9( 3), 01-33. doi:10.4018/IJSSSP.2018070101
    • NLM

      Chaim ML, Santos DS, Cruzes DS. What do we know about buffer overflow detection? [Internet]. International Journal of Systems and Software Security and Protection. 2018 ; 9( 3): 01-33.[citado 2024 out. 11 ] Available from: https://doi.org/10.4018/IJSSSP.2018070101
    • Vancouver

      Chaim ML, Santos DS, Cruzes DS. What do we know about buffer overflow detection? [Internet]. International Journal of Systems and Software Security and Protection. 2018 ; 9( 3): 01-33.[citado 2024 out. 11 ] Available from: https://doi.org/10.4018/IJSSSP.2018070101
  • Fonte: CEUR Workshop Proceedings. Unidade: EACH

    Assuntos: COMPUTAÇÃO MÓVEL, SEGURANÇA DE REDES

    Acesso à fonteComo citar
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      OYETOYAN, Tosin Daniel e CHAIM, Marcos Lordello. Comparing capability of static analysis tools to detect security weaknesses in mobile applications. CEUR Workshop Proceedings, v. 1977, p. 8-18, 2017Tradução . . Disponível em: https://brage.bibsys.no/xmlui/bitstream/handle/11250/2456625/paper2.pdf?sequence=7&isAllowed=y. Acesso em: 11 out. 2024.
    • APA

      Oyetoyan, T. D., & Chaim, M. L. (2017). Comparing capability of static analysis tools to detect security weaknesses in mobile applications. CEUR Workshop Proceedings, 1977, 8-18. Recuperado de https://brage.bibsys.no/xmlui/bitstream/handle/11250/2456625/paper2.pdf?sequence=7&isAllowed=y
    • NLM

      Oyetoyan TD, Chaim ML. Comparing capability of static analysis tools to detect security weaknesses in mobile applications [Internet]. CEUR Workshop Proceedings. 2017 ; 1977 8-18.[citado 2024 out. 11 ] Available from: https://brage.bibsys.no/xmlui/bitstream/handle/11250/2456625/paper2.pdf?sequence=7&isAllowed=y
    • Vancouver

      Oyetoyan TD, Chaim ML. Comparing capability of static analysis tools to detect security weaknesses in mobile applications [Internet]. CEUR Workshop Proceedings. 2017 ; 1977 8-18.[citado 2024 out. 11 ] Available from: https://brage.bibsys.no/xmlui/bitstream/handle/11250/2456625/paper2.pdf?sequence=7&isAllowed=y

Biblioteca Digital de Produção Intelectual da Universidade de São Paulo     2012 - 2024