Basic Search / Search Result

  • Search Result: 7results Search Strategy: "Department of Computer Science and Information Engineering".edept (Phrase) and ekeyword.raw="Static Analysis"


  • Refine the results: Search Expand the trend chart of search results

  • Individualized services

    My Search Strategy

  • Sort:

      
  • Selected0results


      Select all on this page

    1

    Adversarial Attacks Against Opcode-based Malware Detectors Using Transformer at the Assembly Level

    2

    An Imperceptible Adversarial Attack on Structure-Based Malware Detectors

    3

    Displacement Basis Vectors Established by Numerical Method
    • Department of Civil and Construction Engineering /93/ Master
    • Author: Jun-Yan Zhan Advisor: Chan-Ping Pan
    • The main purpose of this research is to establish the displacement basis vectors for static analysi…
    • Clicks: 602Downloads: 0
    • Full text public date 2006/07/21 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    4

    Packed Malware Analysis Based on Voice Conversion and Frequency Analysis
    • Department of Computer Science and Information Engineering /112/ Master
    • Author: Tzu-Wang Chen Advisor: Shao-Jui Wang
    • As malware technologies evolve, traditional static analysis methods have shown their limitations, …
    • Clicks: 216Downloads: 0
    • Full text public date 2029/08/21 (Intranet public)
    • Full text public date 2029/08/21 (Internet public)
    • Full text public date 2029/08/21 (National library)

    5

    Android Malware Detection through the Combination of Vector-based Mechanism and Inter-Component Communication Privilege Graph Inference

    6

    Ransomware Detection with CNN and Deep Learning Based on Multiple Features of Portable Executable Files
    • Department of Electronic and Computer Engineering /109/ Master
    • Author: Chia-Cheng Yang Advisor: Jenq-Shiou Leu
    • With the development of technology, many industries need have to rely on computers to execute the n…
    • Clicks: 1047Downloads: 0
    • Full text public date 2026/08/12 (Intranet public)
    • Full text public date 2026/08/12 (Internet public)
    • Full text public date 2026/08/12 (National library)

    7

    Enhancing IoT Malware Classification through the Extraction of System Calls within Function Call Graphs
    • Department of Computer Science and Information Engineering /112/ Master
    • Author: Wei-Jen Liao Advisor: Hahn-Ming Lee Shin-Ming Cheng
    • The dramatic increase in IoT malware presents significant challenges for analyzing and learning th…
    • Clicks: 273323Downloads: 0
    • Full text public date 2026/08/12 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date 2029/08/12 (National library)
    1