Search alternatives:
detection computer » detection computing (Expand search), detector computed (Expand search), interaction computer (Expand search)
visual programming » fetal programming (Expand search)
programming coding » programming using (Expand search), programming code (Expand search), programming computing (Expand search)
code detection » node detection (Expand search), case detection (Expand search), care detection (Expand search)
coding python » codigo python (Expand search), codigos python (Expand search), using python (Expand search)
coder code » code code (Expand search), modern code (Expand search), color code (Expand search)
detection computer » detection computing (Expand search), detector computed (Expand search), interaction computer (Expand search)
visual programming » fetal programming (Expand search)
programming coding » programming using (Expand search), programming code (Expand search), programming computing (Expand search)
code detection » node detection (Expand search), case detection (Expand search), care detection (Expand search)
coding python » codigo python (Expand search), codigos python (Expand search), using python (Expand search)
coder code » code code (Expand search), modern code (Expand search), color code (Expand search)
1
2
“... control to the attacker’s malicious code. Software vulnerabilities have been the main cause of computer...”
Access document
Access document
Master thesis
3
4
“...Computer architecture is an important subject for informatics and electrical engineering courses...”
Access document
Access document
Master thesis
5
6
7
8
9
10
11
12
13
14
“... para detecção de ataques que eventualmente causem qualquer tipo de alteração no fluxo de execução de um programa...”
Access document
Access document
Master thesis
15
“... depois, o termo vírus de computador foi definido como um programa que infecta outros programas, modicando...”
Access document
Access document
Master thesis
16
“.... Para a codificação dos comportamentos de instrução utilizou-se o programa informático LINCE®. Para a análise...”
Access document
Access document
Article
17
“... de falhas transientes. Falhas transientes podem fazer com que as instruções do programa executem...”
Access document
Access document
Master thesis
18
“... metadados referentes ao programa e os utiliza para realizar uma análise prévia do código e (b) realizam...”
Access document
Access document
Master thesis
19
“... metadados referentes ao programa e os utiliza para realizar uma análise prévia do código e (b) realizam...”
Access document
Access document
Master thesis
20
Análise econômica de projetos:"software"para situações deterministas e de risco envolvendo simulação
“...No estudo é apresentado o desenvolvimento de dois sistemas de programas computacionais...”Access document
Master thesis