Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Executable

Known as: Executable files, Object program, Executable code 
In computing, executable code or an executable file or executable program, sometimes simply an executable, causes a computer "to perform indicated… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
Abstract Coping with malware is getting more and more challenging, given their relentless growth in complexity and volume. One of… Expand
  • figure 1
  • figure 2
  • table 7
  • table 8
  • figure 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild… Expand
  • table 1
  • figure 1
  • table 2
  • figure 2
  • table 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Nowadays, object-oriented meta-languages such as MOF (Meta-Object Facility) are increasingly used to specify domain-specific… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of the work is to recover intermediate… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
A great deal of software is distributed in the form of executable code. The ability to reverse engineer such executables can… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Malicious code detection is a crucial component of any defense mechanism. In this paper, we present a unique viewpoint on… Expand
  • figure 1
  • figure 3
  • figure 4
  • table 1
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
A program suite for one-dimensional small-angle scattering data processing running on IBM-compatible PCs under Windows 9x/NT/2000… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2001
Highly Cited
2001
A serious security threat today is malicious executables, especially new, unseen malicious executables often arriving as email… Expand
  • table I
  • table 2
  • figure 7
  • figure 8
  • table 3
Is this relevant?
Highly Cited
1997
Highly Cited
1997
In many standards track documents several words are used to signify the requirements in the specification. These words are often… Expand
Is this relevant?
Highly Cited
1996
Highly Cited
1996
  • D. Harel, Eran Gery
  • Proceedings of IEEE 18th International Conference…
  • 1996
  • Corpus ID: 62405911
This paper reports on an effort to develop an integrated set of diagrammatic languages for modeling object-oriented systems, and… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Is this relevant?