[1] |
LONG Tingyan, WAN Liang, DENG Xunkun.
Detection Approach of Malicious JavaScript Code Based on Convolutional Neural Network
[J]. Computer Engineering and Applications, 2019, 55(18): 89-94.
|
[2] |
LIN Hongyang, PENG Jianshan, ZHAO Shibin, ZHU Junhu, XU Hang.
Survey on JavaScript Engine Vulnerability Detection
[J]. Computer Engineering and Applications, 2019, 55(11): 16-24.
|
[3] |
LIU Pengrui, SONG Lipeng.
Using dimension reduction approach to identify malicious JavaScript
[J]. Computer Engineering and Applications, 2018, 54(21): 20-24.
|
[4] |
LIU Yingbo1,3, WANG Feng1,2,3, JI Kaifan2, DENG Hui2, DAI Wei1,2,3, LIANG Bo2.
Massive astronomical real-time data indexing based on compressed word-aligned bitmap
[J]. Computer Engineering and Applications, 2016, 52(1): 37-41.
|
[5] |
QIAN Ju, TAO Binxian.
Slithice:system dependence graph based program slicing tool for Java
[J]. Computer Engineering and Applications, 2014, 50(2): 31-34.
|
[6] |
ZHANG Xuexi,LIAN Shuang.
New design and implementation of battle chess game based on J2ME
[J]. Computer Engineering and Applications, 2011, 47(11): 57-59.
|
[7] |
WU Guo-wei,LI Zhang .
Precise program worst-case execution time analysis method
[J]. Computer Engineering and Applications, 2010, 46(18): 60-64.
|
[8] |
LI Zhen-pei1,LI Ping2,WU Ming3.
Research on interaction between X3D virtual scene and Java
[J]. Computer Engineering and Applications, 2010, 46(16): 67-70.
|
[9] |
ZHU Cong-min1,2,HUANG Yu-mei1,SHANGGUAN Wang-yi1.
Design of Java-agent control system for mobile robots
[J]. Computer Engineering and Applications, 2009, 45(5): 74-77.
|
[10] |
WANG Zhen-xing,SHI Lin-xiang,SHEN Wu-min.
Study on key technology of embedded Webserver application
[J]. Computer Engineering and Applications, 2009, 45(28): 79-82.
|
[11] |
YAN Jun-hua,ZHANG Huan-chun,JING Ya-zhi.
Implementation of Multi Agent on dynamic task scheduling for distributed measurement and control system
[J]. Computer Engineering and Applications, 2009, 45(2): 219-222.
|
[12] |
WANG Xin-yu,XU Wen-bo,CHAI Zhi-lei.
Real-time extension for exception handling mechanism in JVM
[J]. Computer Engineering and Applications, 2008, 44(34): 84-86.
|
[13] |
ZHU Quan-yin,ZHANG Hui,SUN Wen-jie.
Development of mobile network games based on J2ME
[J]. Computer Engineering and Applications, 2008, 44(32): 76-78.
|
[14] |
LIAO Ming-xue,FAN Zhi-hua.
Prime number sequence based performance improvement in Java Hashtable
[J]. Computer Engineering and Applications, 2008, 44(3): 108-109.
|
[15] |
ZHANG Xiong,LI Qian-mu,XU Man-wu.
Generative mechanism of fine-grained self-adaptive framework
[J]. Computer Engineering and Applications, 2008, 44(3): 64-66.
|