Technical analysis software

Results: 454



#Item
1Technical Report No. 526 Timing-Sensitive Information Flow Analysis for Synchronous Systems Boris K¨opf and David Basin Information Security ETH Zurich, Switzerland

Technical Report No. 526 Timing-Sensitive Information Flow Analysis for Synchronous Systems Boris K¨opf and David Basin Information Security ETH Zurich, Switzerland

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2010-09-02 11:11:48
    2Technical Analysis of Pegasus Spyware An Investigation Into Highly Sophisticated Espionage Software Contents Executive Summary Background

    Technical Analysis of Pegasus Spyware An Investigation Into Highly Sophisticated Espionage Software Contents Executive Summary Background

    Add to Reading List

    Source URL: info.lookout.com

    - Date: 2016-12-18 17:38:50
      3Delft University of Technology Software Engineering Research Group Technical Report Series A Constraint Language for Static Semantic Analysis Based on Scope Graphs

      Delft University of Technology Software Engineering Research Group Technical Report Series A Constraint Language for Static Semantic Analysis Based on Scope Graphs

      Add to Reading List

      Source URL: swerl.tudelft.nl

      - Date: 2015-12-18 18:38:35
        4Short Technical Reports CellProfiler™: free, versatile software for automated biological image analysis Michael R. Lamprecht1, David M. Sabatini1,2, and Anne E. Carpenter1 1Whitehead

        Short Technical Reports CellProfiler™: free, versatile software for automated biological image analysis Michael R. Lamprecht1, David M. Sabatini1,2, and Anne E. Carpenter1 1Whitehead

        Add to Reading List

        Source URL: d1zymp9ayga15t.cloudfront.net

        - Date: 2016-02-08 14:22:32
          5ARMY REQUIREMENTS FOR DIGITAL TOPOGRAPHIC DATA R.A. Herrraann US Army Engineer Topographic Laboratories Fort Belvoir, VAABSTRACT The Engineer Topographic Laboratories (ETL) recently completed a two

          ARMY REQUIREMENTS FOR DIGITAL TOPOGRAPHIC DATA R.A. Herrraann US Army Engineer Topographic Laboratories Fort Belvoir, VAABSTRACT The Engineer Topographic Laboratories (ETL) recently completed a two

          Add to Reading List

          Source URL: mapcontext.com

          Language: English - Date: 2008-08-29 23:59:33
          6Static Analysis of Implicit Control Flow: Resolving Java Reflection and Android Intents (extended version) Technical report UW-CSEComputer Science & Engineering University of Washington

          Static Analysis of Implicit Control Flow: Resolving Java Reflection and Android Intents (extended version) Technical report UW-CSEComputer Science & Engineering University of Washington

          Add to Reading List

          Source URL: homes.cs.washington.edu

          Language: English - Date: 2015-09-05 00:16:54
          7Aachen Department of Computer Science Technical Report Automated Termination Analysis for Programs with Pointer Arithmetic

          Aachen Department of Computer Science Technical Report Automated Termination Analysis for Programs with Pointer Arithmetic

          Add to Reading List

          Source URL: sunsite.informatik.rwth-aachen.de

          Language: English - Date: 2015-09-01 06:52:18
          8HADES (Haskins Analysis Display and Experiment System) Philip Rubin, Ph.D. Vice President for Technical Resources Research Staff

          HADES (Haskins Analysis Display and Experiment System) Philip Rubin, Ph.D. Vice President for Technical Resources Research Staff

          Add to Reading List

          Source URL: www.haskins.yale.edu

          Language: English - Date: 2006-01-31 18:52:40
          9USERGUIDE  SESSION MAP TABLE OF CONTENTS

          USERGUIDE SESSION MAP TABLE OF CONTENTS

          Add to Reading List

          Source URL: www.jfdbrokers.com

          Language: English - Date: 2016-08-10 04:42:34
          10Technical Report Nr. TUD-CSFeb. 5th, 2015 Harvesting Runtime Data in Android Applications for Identifying Malware and

          Technical Report Nr. TUD-CSFeb. 5th, 2015 Harvesting Runtime Data in Android Applications for Identifying Malware and

          Add to Reading List

          Source URL: www.bodden.de

          Language: English - Date: 2015-02-10 01:12:58