Showing 1 - 20 results of 29 for search '(( algorithm ((hardening function) OR (python function)) ) OR ( algorithm l function ))', query time: 0.10s Refine Results
  1. 1

    New aspect-oriented constructs for security hardening concerns by Mourad, Azzam

    Published 2009
    “…They allow to analyze a program's call graph in order to determine how to change function signatures for passing the parameters associated with a given security hardening. …”
    Get full text
    Get full text
    Get full text
    article
  2. 2

    New primitives to AOP weaving capabilities for security hardening concerns by Mourad, Azzam

    Published 2007
    “…They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  3. 3

    Common weaving approach in mainstream languages for software security hardening by Alhadidi, Dima

    Published 2013
    “…In this paper, we propose a novel aspect-oriented approach based on GIMPLE, a language-independent and a tree-based representation generated by the GNU Compiler Collection (GCC), for the systemization of application security hardening. The security solutions are woven into GIMPLE representations in a systematic way, eliminating the need for manual hardening that might generate a considerable number of errors. …”
    Get full text
    Get full text
    Get full text
    article
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Development of Lévy flight-based reptile search algorithm with local search ability for power systems engineering design problems by Abu Zitar, Raed

    Published 2022
    “…In conclusion, the proposed L-RSANM algorithm is shown to be more capable to solve the challenging power systems engineering design problems.…”
    Get full text
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité by Mourad, Azzam

    Published 2009
    “…They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
    Get full text
    Get full text
    Get full text
    article
  20. 20

    Optimal shunt compensators at nonsinusoidal busbars by El-Amin, I.M.

    Published 1995
    “…This model was solved employing the penalty function approach and the golden Section Search algorithm for solving the linear load case. …”
    Get full text
    Get full text
    article