Scaling Automatic Extraction of Pseudocode

L Toksoz, G Tan, CL Giles - arXiv preprint arXiv:2406.04635, 2024 - arxiv.org
Pseudocode in a scholarly paper provides a concise way to express the algorithms
implemented therein. Pseudocode can also be thought of as an intermediary representation …

Techniques for Accelerating Algebraic Operations in Agent-based Information Security Systems

SV Bezzateev, SG Fomicheva… - 2023 Wave Electronics …, 2023 - ieeexplore.ieee.org
The paper discusses the interaction mechanisms of cybersecurity centers and compliance
with security and event management systems. The emphasis is on the agent approach. The …

Continuous Authentication in a UAVs Swarm

S Bezzateev, S Fomicheva - 2023 15th International Congress …, 2023 - ieeexplore.ieee.org
The coordinating interaction allows the UAVs swarm to distribute the workload and increase
the efficiency of performing target tasks. However, if it is necessary to change the …

[PDF][PDF] SimCoDe-NET: Similarity Detection in Binary Code using Deep Learning Network

S Poornima, R Mahalakshmi - ijeer.forexjournal.co.in
░ ABSTRACT-Binary code similarity detection is a fundamental task in the field of computer
binary security. However, code similarity is crucial today because of the prevalence of issues …