Algebraic patterns of binary code vulnerabilities
Saved in:
| Date: | 2020 |
|---|---|
| Main Author: | V. M. Yakovlev |
| Format: | Article |
| Language: | English |
| Published: |
2020
|
| Series: | Problems in programming |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001130347 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Algebraic patterns of binary code vulnerabilities
by: Yakovlev, V.M.
Published: (2020)
by: Yakovlev, V.M.
Published: (2020)
Algebraic Approach to Vulnerabilities Formalization in the Binary Code
by: O. O. Letychevskyi, et al.
Published: (2019)
by: O. O. Letychevskyi, et al.
Published: (2019)
Extended binary Golay codes by a group algebra
by: Bortos, Maria Yu., et al.
Published: (2024)
by: Bortos, Maria Yu., et al.
Published: (2024)
The Normed Algebra of Binary Numbers
by: Вотякова, Леся, et al.
Published: (2024)
by: Вотякова, Леся, et al.
Published: (2024)
On semisimple algebra codes: generator theory
by: Martınez-Moro, Edgar
Published: (2018)
by: Martınez-Moro, Edgar
Published: (2018)
On semisimple algebra codes: generator theory
by: Martınez-Moro, E.
Published: (2007)
by: Martınez-Moro, E.
Published: (2007)
Priorities for Social Vulnerability Reduction Policy
by: O. V. Makarova
Published: (2017)
by: O. V. Makarova
Published: (2017)
Vulnerability of complex network structures and systems
by: O. D. Polishchuk
Published: (2020)
by: O. D. Polishchuk
Published: (2020)
Algebraic Combinatorics of application for problems coding and cryptography
by: O. S. Pustovit, et al.
Published: (2017)
by: O. S. Pustovit, et al.
Published: (2017)
Social vulnerability assessment: theoretical and methodological aspects
by: O. T. Ryndzak
Published: (2022)
by: O. T. Ryndzak
Published: (2022)
Automatic detection algorithm for vulnerability of SQL-injection
by: A. T. Rakhmanov, et al.
Published: (2019)
by: A. T. Rakhmanov, et al.
Published: (2019)
Construction of self-dual binary [2²ⁿ,2²ⁿ⁻¹,2ⁿ]-codes
by: Hannusch, C., et al.
Published: (2016)
by: Hannusch, C., et al.
Published: (2016)
The relations for Poincarй series of algebras of invariants of binary forms
by: N. B. Ilash
Published: (2021)
by: N. B. Ilash
Published: (2021)
Model of History in the Jesuit Rhetoric System: Patterns and Features of Author's Coding
by: Ye. Huliuk
Published: (2018)
by: Ye. Huliuk
Published: (2018)
Social vulnerability of the population of Ukraine: conceptual and spatial modeling
by: L. K. Semiv, et al.
Published: (2022)
by: L. K. Semiv, et al.
Published: (2022)
Structural vulnerability and financial instability in Ukraine: global context
by: S. O. Korablin, et al.
Published: (2018)
by: S. O. Korablin, et al.
Published: (2018)
Human trafficking as a form of violence on vulnerable populations
by: O. I. Kotliar
Published: (2016)
by: O. I. Kotliar
Published: (2016)
An attempt to assess the vulnerability of breeding birds of Ukraine to climate change
by: M. V. Bannik, et al.
Published: (2010)
by: M. V. Bannik, et al.
Published: (2010)
Typology of the Vulnerable People and Groups: A Legal and Historical Reconstruction
by: I. M. Sharkova
Published: (2018)
by: I. M. Sharkova
Published: (2018)
Innovative Social Work Practices for Vulnerable Groups of the Population in Ukraine
by: Yu. V. Horemykina
Published: (2020)
by: Yu. V. Horemykina
Published: (2020)
An approach to website vulnerability detection based on static and dynamic analysis
by: Popereshnyak, S.V., et al.
Published: (2026)
by: Popereshnyak, S.V., et al.
Published: (2026)
Vulnerability of social analysts' perceptions of war: opportunities to overcome
by: L. M. Khyzhniak, et al.
Published: (2022)
by: L. M. Khyzhniak, et al.
Published: (2022)
Social services for vulnerable groups of the population in territorial communities of Ukraine
by: T. A. Zaiats, et al.
Published: (2022)
by: T. A. Zaiats, et al.
Published: (2022)
Problems of Social Vulnerability of Internally Displaced Persons and Forced Migrants
by: I. Novak
Published: (2022)
by: I. Novak
Published: (2022)
Influence of local binary pattern configurations and XGBoost on the quality of satellite image classification with noise and compression: experimental study
by: Rybnytskyi, Maksym, et al.
Published: (2026)
by: Rybnytskyi, Maksym, et al.
Published: (2026)
Construction of self-dual binary \([2^{2k},2^{2k-1},2^k]\)-codes
by: Hannusch, Carolin, et al.
Published: (2016)
by: Hannusch, Carolin, et al.
Published: (2016)
Causes of Vulnerability and Resilience of the Conventional Monetary Regime – Flexible Inflation Targeting
by: T. O. Krychevska
Published: (2019)
by: T. O. Krychevska
Published: (2019)
Methods of blocking the vulnerabilities of the XSS type based on service-oriented architecture
by: Kh. Khamdamov, et al.
Published: (2019)
by: Kh. Khamdamov, et al.
Published: (2019)
The use stress-testing for the estimation of vulnerability of economic stability of machine-building enterprise
by: O. V. Masliuk
Published: (2014)
by: O. V. Masliuk
Published: (2014)
Targeting of Social Programs at Vulnerable Groups: Sustainable Trends and Post-War Prospects
by: L. Cherenko
Published: (2023)
by: L. Cherenko
Published: (2023)
Investigation of General Characteristics of UES of Ukraine and Elements of Technological Vulnerability in Therms of Cybersecurit
by: Yu. Komarov
Published: (2019)
by: Yu. Komarov
Published: (2019)
Vulnerability assessment and possible ways to adapt Ukrainian energy sector to climate change
by: Ivanenko N.P., et al.
Published: (2011)
by: Ivanenko N.P., et al.
Published: (2011)
Mathematical Justification of the Indicator of Measure of Concentration of Member Influence for Analysing Vulnerability of the Credit Union
by: V. I. Alieksieiev
Published: (2014)
by: V. I. Alieksieiev
Published: (2014)
Synthesis of algorithms for recognition of vulnerabilities in web-resources through signatures of fuzzy linguistic features
by: O. A. Iliashov
Published: (2017)
by: O. A. Iliashov
Published: (2017)
Climatic factors influencing the vulnerability of Scots pine to bark beetles attacks in the Central Polissya
by: O. Y. Andreieva
Published: (2018)
by: O. Y. Andreieva
Published: (2018)
Semisimple group codes and dihedral codes
by: Dutra, Flaviana S., et al.
Published: (2018)
by: Dutra, Flaviana S., et al.
Published: (2018)
Simulation of the vulnerability of the steppe landscape and climate zone of Ukraine to climate changes based on space image data
by: M. S. Lubskyi, et al.
Published: (2024)
by: M. S. Lubskyi, et al.
Published: (2024)
Linguocultural codes
by: M. V. Pimenova
Published: (2017)
by: M. V. Pimenova
Published: (2017)
On the kinetics of binary nucleation
by: Alekseechkin, N.V.
Published: (2009)
by: Alekseechkin, N.V.
Published: (2009)
Binary coronas of balleans
by: Protasov, I.V.
Published: (2003)
by: Protasov, I.V.
Published: (2003)
Similar Items
-
Algebraic patterns of binary code vulnerabilities
by: Yakovlev, V.M.
Published: (2020) -
Algebraic Approach to Vulnerabilities Formalization in the Binary Code
by: O. O. Letychevskyi, et al.
Published: (2019) -
Extended binary Golay codes by a group algebra
by: Bortos, Maria Yu., et al.
Published: (2024) -
The Normed Algebra of Binary Numbers
by: Вотякова, Леся, et al.
Published: (2024) -
On semisimple algebra codes: generator theory
by: Martınez-Moro, Edgar
Published: (2018)