Algebraic Approach to Vulnerabilities Formalization in the Binary Code
Saved in:
| Date: | 2019 |
|---|---|
| Main Authors: | O. O. Letychevskyi, Ya. V. Hryniuk, V. M. Yakovlev |
| Format: | Article |
| Language: | English |
| Published: |
2019
|
| Series: | Control Systems and Computers |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001096246 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Algebraic patterns of binary code vulnerabilities
by: V. M. Yakovlev
Published: (2020)
by: V. M. Yakovlev
Published: (2020)
Algebraic patterns of binary code vulnerabilities
by: Yakovlev, V.M.
Published: (2020)
by: Yakovlev, V.M.
Published: (2020)
Extended binary Golay codes by a group algebra
by: Bortos, Maria Yu., et al.
Published: (2024)
by: Bortos, Maria Yu., et al.
Published: (2024)
Algebraic approach to the analysis of legal documents
by: Letychevskyi, O.O., et al.
Published: (2023)
by: Letychevskyi, O.O., et al.
Published: (2023)
Algebraic approach to the analysis of legal documents
by: Letychevskyi, O.O., et al.
Published: (2022)
by: Letychevskyi, O.O., et al.
Published: (2022)
Generation of multipurpose formal models from legacy code
by: Potiyenko, S.V., et al.
Published: (2023)
by: Potiyenko, S.V., et al.
Published: (2023)
An approach to website vulnerability detection based on static and dynamic analysis
by: Popereshnyak, S.V., et al.
Published: (2026)
by: Popereshnyak, S.V., et al.
Published: (2026)
The Normed Algebra of Binary Numbers
by: Вотякова, Леся, et al.
Published: (2024)
by: Вотякова, Леся, et al.
Published: (2024)
Priorities for Social Vulnerability Reduction Policy
by: O. V. Makarova
Published: (2017)
by: O. V. Makarova
Published: (2017)
Algebraic approach and artificial intelligence methods in modern intrusion detection systems
by: O. O. Letychevskyi, et al.
Published: (2023)
by: O. O. Letychevskyi, et al.
Published: (2023)
Algebraic Combinatorics of application for problems coding and cryptography
by: O. S. Pustovit, et al.
Published: (2017)
by: O. S. Pustovit, et al.
Published: (2017)
Vulnerability of complex network structures and systems
by: O. D. Polishchuk
Published: (2020)
by: O. D. Polishchuk
Published: (2020)
On semisimple algebra codes: generator theory
by: Martınez-Moro, Edgar
Published: (2018)
by: Martınez-Moro, Edgar
Published: (2018)
On semisimple algebra codes: generator theory
by: Martınez-Moro, E.
Published: (2007)
by: Martınez-Moro, E.
Published: (2007)
Social vulnerability assessment: theoretical and methodological aspects
by: O. T. Ryndzak
Published: (2022)
by: O. T. Ryndzak
Published: (2022)
Formal semantics and analysis of tokenomics properties
by: Letychevskyi, O.O., et al.
Published: (2023)
by: Letychevskyi, O.O., et al.
Published: (2023)
Formal semantics and analysis of tokenomics properties
by: Letychevskyi, O.O., et al.
Published: (2022)
by: Letychevskyi, O.O., et al.
Published: (2022)
Formal semantics of aggregate operations of multiset table algebra
by: Glushko, I.M.
Published: (2025)
by: Glushko, I.M.
Published: (2025)
Algebraic modeling and its application
by: O. O. Letychevskyi
Published: (2021)
by: O. O. Letychevskyi
Published: (2021)
Use of metods of algebraic programming for the formal verification of legal acts
by: V. Peschanenko, et al.
Published: (2018)
by: V. Peschanenko, et al.
Published: (2018)
Use of methods of algebraic programming for the formal verification of legal acts
by: Peschanenko, V.S., et al.
Published: (2018)
by: Peschanenko, V.S., et al.
Published: (2018)
Use of metods of algebraic programming for the formal verification of legal acts
by: Peschanenko, V., et al.
Published: (2018)
by: Peschanenko, V., et al.
Published: (2018)
Formalization of the mathematical modeling process of adaptive change of code structure in wireless data transmission
by: B. V. Horlynskyi, et al.
Published: (2019)
by: B. V. Horlynskyi, et al.
Published: (2019)
Formalization of the mathematical modeling process of adaptive change of code structure in wireless data transmission
by: Horlynskyi, Borys V., et al.
Published: (2019)
by: Horlynskyi, Borys V., et al.
Published: (2019)
Structural vulnerability and financial instability in Ukraine: global context
by: S. O. Korablin, et al.
Published: (2018)
by: S. O. Korablin, et al.
Published: (2018)
Human trafficking as a form of violence on vulnerable populations
by: O. I. Kotliar
Published: (2016)
by: O. I. Kotliar
Published: (2016)
Social vulnerability of the population of Ukraine: conceptual and spatial modeling
by: L. K. Semiv, et al.
Published: (2022)
by: L. K. Semiv, et al.
Published: (2022)
Automatic detection algorithm for vulnerability of SQL-injection
by: A. T. Rakhmanov, et al.
Published: (2019)
by: A. T. Rakhmanov, et al.
Published: (2019)
Construction of self-dual binary [2²ⁿ,2²ⁿ⁻¹,2ⁿ]-codes
by: Hannusch, C., et al.
Published: (2016)
by: Hannusch, C., et al.
Published: (2016)
Vulnerability of social analysts' perceptions of war: opportunities to overcome
by: L. M. Khyzhniak, et al.
Published: (2022)
by: L. M. Khyzhniak, et al.
Published: (2022)
Cohomology and formal deformations of n-Hom–Lie color algebras
by: K. Abdaoui, et al.
Published: (2023)
by: K. Abdaoui, et al.
Published: (2023)
Cohomology and formal deformations of $n$-Hom–Lie color algebras
by: Abdaoui, K., et al.
Published: (2023)
by: Abdaoui, K., et al.
Published: (2023)
The relations for Poincarй series of algebras of invariants of binary forms
by: N. B. Ilash
Published: (2021)
by: N. B. Ilash
Published: (2021)
An attempt to assess the vulnerability of breeding birds of Ukraine to climate change
by: M. V. Bannik, et al.
Published: (2010)
by: M. V. Bannik, et al.
Published: (2010)
Social services for vulnerable groups of the population in territorial communities of Ukraine
by: T. A. Zaiats, et al.
Published: (2022)
by: T. A. Zaiats, et al.
Published: (2022)
Innovative Social Work Practices for Vulnerable Groups of the Population in Ukraine
by: Yu. V. Horemykina
Published: (2020)
by: Yu. V. Horemykina
Published: (2020)
Typology of the Vulnerable People and Groups: A Legal and Historical Reconstruction
by: I. M. Sharkova
Published: (2018)
by: I. M. Sharkova
Published: (2018)
Causes of Vulnerability and Resilience of the Conventional Monetary Regime – Flexible Inflation Targeting
by: T. O. Krychevska
Published: (2019)
by: T. O. Krychevska
Published: (2019)
Overview of the modern methods of protection and security of software systems
by: O. O. Letychevskyi, et al.
Published: (2019)
by: O. O. Letychevskyi, et al.
Published: (2019)
The use stress-testing for the estimation of vulnerability of economic stability of machine-building enterprise
by: O. V. Masliuk
Published: (2014)
by: O. V. Masliuk
Published: (2014)
Similar Items
-
Algebraic patterns of binary code vulnerabilities
by: V. M. Yakovlev
Published: (2020) -
Algebraic patterns of binary code vulnerabilities
by: Yakovlev, V.M.
Published: (2020) -
Extended binary Golay codes by a group algebra
by: Bortos, Maria Yu., et al.
Published: (2024) -
Algebraic approach to the analysis of legal documents
by: Letychevskyi, O.O., et al.
Published: (2023) -
Algebraic approach to the analysis of legal documents
by: Letychevskyi, O.O., et al.
Published: (2022)