Deep search:Searching for "static analysis" in 'ABSTRACT and KEYWORDGot 11 items.
index Title
1Hierarchical closed form solutions for plates bent by localized transverse loadings
Author(s):CARRERA E., GIUNTA G., BRISCHETTO S.  Clicked:4752  Download:2360  Cited:16  <Full Text>
Journal of Zhejiang University Science A  2007 Vol.8 No.7 P.1026-1037  DOI:10.1631/jzus.2007.A1026
2Optimum design of large span concrete filled steel tubular arch bridge based on static, stability and modal...
Author(s):ZHAO Chang-jun, HU Jun, XU Xing  Clicked:5241  Download:2162  Cited:0  <Full Text>
Journal of Zhejiang University Science  2002 Vol.3 No.2 P.166-173  DOI:10.1631/jzus.2002.0166
3A power-aware code-compression design for RISC/VLIW architecture
Author(s):Che-Wei Lin, Chang Hong Lin, Wei J...  Clicked:4727  Download:2278  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.8 P.629-637  DOI:10.1631/jzus.C1000321
4Comparison of various procedures for progressive collapse analysis of cable-stayed bridges
Author(s):Jian-guo Cai, Yi-xiang Xu, Li-ping...  Clicked:5916  Download:8081  Cited:12  <Full Text>
Journal of Zhejiang University Science A  2012 Vol.13 No.5 P.323-334  DOI:10.1631/jzus.A1100296
5Discovering optimal features using static analysis and a genetic search based method for Android malware de...
Author(s):Ahmad Firdaus, Nor Badrul Anuar, A...  Clicked:4454  Download:2939  Cited:0  <Full Text>  <PPT> 1539
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.6 P.712-736  DOI:10.1631/FITEE.1601491
6A method for the global optimization of the tooth contact pattern and transmission error of spiral bevel an...
Author(s):Yao-bin Zhuo, Xue-yan Xiang, Xiao-...  Clicked:3375  Download:2678  Cited:0  <Full Text>  <PPT> 1467
Journal of Zhejiang University Science A  2017 Vol.18 No.5 P.377-392  DOI:10.1631/jzus.A1600240
7Efficient vulnerability detection based on an optimized rule-checking static analysis technique
Author(s):Deng Chen, Yan-duo Zhang, Wei Wei,...  Clicked:3776  Download:1684  Cited:0  <Full Text>  <PPT> 1397
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.3 P.332-345  DOI:10.1631/FITEE.1500379
8A survey of malware behavior description and analysis
Author(s):Bo Yu, Ying Fang, Qiang Yang, Yong...  Clicked:5356  Download:4077  Cited:0  <Full Text>  <PPT> 1223
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.5 P.583-603  DOI:10.1631/FITEE.1601745
9Static analysis of a stepped main shaft in a mine hoist by means of the modified 1D higher-order theory
Author(s):Wen-xiang Teng, Zhen-cai Zhu  Clicked:2283  Download:1351  Cited:0  <Full Text>  <PPT> 1240
Journal of Zhejiang University Science A  2018 Vol.19 No.9 P.719-734  DOI:10.1631/jzus.A1700509
10Structural design and analysis of a composite wing with high aspect ratio
Author(s):Yu-shan Meng, Li Yan, Wei Huang, T...  Clicked:3767  Download:1597  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2019 Vol.20 No.10 P.781-793  DOI:10.1631/jzus.A1900271
11Generic, efficient, and effective deobfuscation and semantic-aware attack detection for PowerShell scripts
Author(s):Chunlin XIONG, Zhenyuan LI, Yan CH...  Clicked:3045  Download:2077  Cited:0  <Full Text>  <PPT> 66
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.3 P.361-381  DOI:10.1631/FITEE.2000436
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2022 Journal of Zhejiang University-SCIENCE