{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:27:32Z","timestamp":1725575252276},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642181771"},{"type":"electronic","value":"9783642181788"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-18178-8_21","type":"book-chapter","created":{"date-parts":[[2011,1,15]],"date-time":"2011-01-15T11:09:47Z","timestamp":1295089787000},"page":"241-253","source":"Crossref","is-referenced-by-count":2,"title":["Traceability of Executable Codes Using Neural Networks"],"prefix":"10.1007","author":[{"given":"Davidson R.","family":"Boccardo","sequence":"first","affiliation":[]},{"given":"Tiago M.","family":"Nascimento","sequence":"additional","affiliation":[]},{"given":"Raphael C.","family":"Machado","sequence":"additional","affiliation":[]},{"given":"Charles B.","family":"Prado","sequence":"additional","affiliation":[]},{"given":"Luiz F. R. C.","family":"Carmo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"8","key":"21_CR1","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1145\/358198.358210","volume":"27","author":"K. Thompson","year":"1984","unstructured":"Thompson, K.: Reflections on trusting trust. ACM Commun.\u00a027(8), 761\u2013763 (1984)","journal-title":"ACM Commun."},{"key":"21_CR2","unstructured":"McDonald, J.: Delphi falls prey, http:\/\/www.symantec.com\/connect\/blogs\/delphi-falls-prey (last accessed October 2009)"},{"key":"21_CR3","first-page":"1","volume-title":"Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research, CSIIRW 2009","author":"D. Quinlan","year":"2009","unstructured":"Quinlan, D., Panas, T.: Source code and binary analysis of software defects. In: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research, CSIIRW 2009, pp. 1\u20134. ACM, New York (2009)"},{"key":"21_CR4","first-page":"67","volume-title":"Proceedings of the 12th Working Conference on Reverse Engineering, WCRE 2005","author":"A.E. Hassan","year":"1995","unstructured":"Hassan, A.E., Jiang, Z.M., Holt, R.C.: Source versus object code extraction for recovering software architecture. In: Proceedings of the 12th Working Conference on Reverse Engineering, WCRE 2005, Washington, DC, USA, pp. 67\u201376. IEEE Computer Society, Los Alamitos (1995)"},{"key":"21_CR5","unstructured":"Hatton, L.: Estimating source lines of code from object code. In: Windows and Embedded Control Systems (2005), http:\/\/www.leshatton.org\/Documents\/LOC2005.pdf"},{"key":"21_CR6","unstructured":"Buttle, D.L.: Verification of Compiled Code. PhD thesis, University of York, UK (2001)"},{"key":"21_CR7","unstructured":"Wang, Z., Pierce, K., McFarling, S.: Bmat - a binary matching tool for stale profile propagation. The Journal of Instruction-Level Parallelism (2002)"},{"key":"21_CR8","volume-title":"Proc. of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)","author":"H. Flake","year":"2004","unstructured":"Flake, H.: Structural comparison of executable objects. In: Proc. of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). IEEE Computer Society, Los Alamitos (2004)"},{"key":"21_CR9","unstructured":"Oh, J.: Fight against 1-day exploits: Diffing binaries vs anti-diffing binaries. In: Blackhat Technical Security Conference (2009)"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Zhenga, J.: A digital image encryption algorithm based on hyper-chaotic cellular neural network. Journal Fundamenta Informaticae (2009)","DOI":"10.3233\/FI-2009-0018"},{"key":"21_CR11","unstructured":"Zeng, H., Rine, D.: A neural network approach for software defects fix effort estimation. In: IASTED Conf. on Software Engineering and Applications, pp. 513\u2013517 (2004)"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Zhenga, J.: Predicting software reliability with neural network ensembles. Expert Systems with Applications\u00a0(36), 2116\u20132122 (2007)","DOI":"10.1016\/j.eswa.2007.12.029"},{"key":"21_CR13","unstructured":"Reddy, C.S., Raju, K.V.S.V.N., Kumari, V.V., Devi, G.L.: Fault-prone module prediction of a web application using artificial neural networks. In: Proceeding (591) Software Engineering and Applications (2007)"},{"key":"21_CR14","unstructured":"Lenic, M., Povalej, P., Kokol, P., Cardoso, A.I.: Using cellular automata to predict reliability of modules. In: Proceeding (436) Software Engineering and Applications (2004)"},{"key":"21_CR15","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1109\/CSMR.2001.914984","volume-title":"Proceedings of the Fifth European Conference on Software Maintenance and Reengineering, CSMR 2001","author":"E. Moretti","year":"2001","unstructured":"Moretti, E., Chanteperdrix, G., Osorio, A.: New algorithms for control-flow graph structuring. In: Proceedings of the Fifth European Conference on Software Maintenance and Reengineering, CSMR 2001, Washington, DC, USA, p. 184. IEEE Computer Society, Los Alamitos (2001)"},{"key":"21_CR16","unstructured":"IdaPro: Ida pro - disassembler, http:\/\/www.hex-rays.com\/idapro\/ (last accessed January 2010)"},{"key":"21_CR17","unstructured":"Poznyakoff, S.: Gnu cflow, http:\/\/savannah.gnu.org\/projects\/cflow (last accessed January 2010)"},{"issue":"1","key":"21_CR18","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1023\/A:1019755726221","volume":"16","author":"I.B. Ciocoiu","year":"2002","unstructured":"Ciocoiu, I.B.: Hybrid feedforward neural networks for solving classification problems. Neural Processing Letters\u00a016(1), 81\u201391 (2002)","journal-title":"Neural Processing Letters"},{"issue":"1","key":"21_CR19","first-page":"163","volume":"33","author":"R. Asadi","year":"2009","unstructured":"Asadi, R., Mustapha, N., Sulaiman, N.: New supervisioned multi layer feed forward neural network model to accelerate classification with high accuracy. European Journal of Scientific Research\u00a033(1), 163\u2013178 (2009)","journal-title":"European Journal of Scientific Research"},{"key":"21_CR20","volume-title":"Neural Networks: A Comprehensive Foundation","author":"S. Haykin","year":"1998","unstructured":"Haykin, S.: Neural Networks: A Comprehensive Foundation. Prentice Hall, Englewood Cliffs (1998)"},{"key":"21_CR21","volume-title":"Introduction to the Theory of Neural Computation","author":"J.A. Hertz","year":"1991","unstructured":"Hertz, J.A., Krogh, A.S., Palmer, R.G.: Introduction to the Theory of Neural Computation. Addison-Wesley, Redwood City (1991)"},{"key":"21_CR22","unstructured":"Moler, C.B.: MATLAB \u2014 an interactive matrix laboratory. Technical Report 369, University of New Mexico. Dept. of Computer Science (1980)"},{"key":"21_CR23","unstructured":"Burkard, J.: C software, http:\/\/people.sc.fsu.edu\/burkardt\/ (last accessed January 2010)"},{"key":"21_CR24","unstructured":"Oliveira Cruz, A.J.: C software, http:\/\/equipe.nce.ufrj.br\/adriano\/c\/exemplos.htm (last accessed January 2010)"},{"key":"21_CR25","unstructured":"Microsystems, S.: Virtualbox, http:\/\/www.virtualbox.org (last accessed January 2010)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-18178-8_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,4]],"date-time":"2023-06-04T17:56:12Z","timestamp":1685901372000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-18178-8_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642181771","9783642181788"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-18178-8_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}