|
Informatics: Formation of computer software and technologies of software systems E. M. Lavrischeva, A. K. Petrenko
|
7 |
|
Method for analysis of code-reuse attacks A. V. Vishnyakov, A. R. Nurmukhametov, Sh. F. Kurmangaleev, S. S. Gaysaryan
|
31 |
|
An approach to the c string analysis for buffer overflow detection I. A. Dudina, N. E. Malyshev
|
55 |
|
Approach to analyzing executable code based on the software architecture recovery D. S. Kononov
|
75 |
|
Platform for interprocedural static analysis of binary code H. K. Aslanyan
|
89 |
|
Tracing ext3 file system operations in the QEMU emulator V. M. Stepanov, P. M. Dovgalyuk, D. N. Poletaev
|
101 |
|
Reading the contents of deleted and modified files in the virtualization based black-box binary analysis system Drakvuf S. G. Kovalev
|
109 |
|
Methodology and tools for development and verification of formal fUML models of requirements and architecture for complex software and hardware systems A. V. Samonov, G. N. Samonova
|
123 |
|
TLA+ based access control model specification A. V. Kozachok
|
147 |
|
Formalizing metamodel of requirements management system D. S. Kildishev, A. V. Khoroshilov
|
163 |
|
Entity-level classification of adverse drug reactions: a comparison of neural network models I. S. Alimova, E. V. Tutubalina
|
177 |
|
Rock flow simulation by high-order quasi-characteristics scheme M. P. Levin
|
197 |
|
Specialized robust CFD RANS microscale meteorological model for modelling atmospheric processes and transport of contaminants in urban and industrial areas O. S. Sorokovikova, D. V. Dzama, D. G. Asfandiyarov
|
213 |
|
Numerical simulation of motions of a ship with a moonpool in head waves K. D. Ovchinnikov
|
235 |
|
Ontological CFD-repository V. A. Zenkin
|
249 |
|
Verifying functional properties of smart contracts using symbolic model-checking E. S. Shishkin
|
265 |