Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Executable

Known as: Executable files, Object program, Executable code 
In computing, executable code or an executable file or executable program, sometimes simply an executable, causes a computer "to perform indicated… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2006
Highly Cited
2006
We describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild… Expand
  • table 1
  • figure 1
  • table 2
  • figure 2
  • table 3
Highly Cited
2005
Highly Cited
2005
Network worms are malicious programs that spread automatically across networks by exploiting vulnerabilities that affect a large… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Highly Cited
2004
Highly Cited
2004
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered… Expand
  • table 1
  • figure 1
  • figure 2
  • table 2
  • table 3
Highly Cited
2004
Highly Cited
2004
This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of the work is to recover intermediate… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2003
Highly Cited
2003
A great deal of software is distributed in the form of executable code. The ability to reverse engineer such executables can… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2003
Highly Cited
2003
Malicious code detection is a crucial component of any defense mechanism. In this paper, we present a unique viewpoint on… Expand
  • figure 1
  • figure 3
  • figure 4
  • table 1
  • figure 5
Highly Cited
2003
Highly Cited
2003
A program suite for one-dimensional small-angle scattering data processing running on IBM-compatible PCs under Windows 9x/NT/2000… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Highly Cited
2001
Highly Cited
2001
A serious security threat today is malicious executables, especially new, unseen malicious executables often arriving as email… Expand
  • table I
  • table 2
  • figure 7
  • figure 8
  • table 3
Highly Cited
1997
Highly Cited
1997
In many standards track documents several words are used to signify the requirements in the specification. These words are often… Expand
Highly Cited
1996
Highly Cited
1996
  • D. Harel, Eran Gery
  • Proceedings of IEEE 18th International Conference…
  • 1996
  • Corpus ID: 62405911
This paper reports on an effort to develop an integrated set of diagrammatic languages for modeling object-oriented systems, and… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 6