scholarly journals Comparison of static and dynamic analysis techniques for longitudinal analysis of amyloid PET

2020 ◽  
Vol 16 (S5) ◽  
Author(s):  
David M Cash ◽  
Pawel J Markiewicz ◽  
Jieqing Jiao ◽  
William Coath ◽  
Marc Modat ◽  
...  
Author(s):  
Angelos D. Keromytis ◽  
Salvatore J. Stolfo ◽  
Junfeng Yang ◽  
Angelos Stavrou ◽  
Anup Ghosh ◽  
...  

2021 ◽  
pp. 1-25
Author(s):  
Hector David Menendez

"Antivirus is death"' and probably every detection system that focuses on a single strategy for indicators of compromise. This famous quote that Brian Dye --Symantec's senior vice president-- stated in 2014 is the best representation of the current situation with malware detection and mitigation. Concealment strategies evolved significantly during the last years, not just like the classical ones based on polimorphic and metamorphic methodologies, which killed the signature-based detection that antiviruses use, but also the capabilities to fileless malware, i.e. malware only resident in volatile memory that makes every disk analysis senseless. This review provides a historical background of different concealment strategies introduced to protect malicious --and not necessarily malicious-- software from different detection or analysis techniques. It will cover binary, static and dynamic analysis, and also new strategies based on machine learning from both perspectives, the attackers and the defenders.


Author(s):  
Cong Liu

Design pattern detection can provide useful insights to support software comprehension. Accurate and complete detection of pattern instances are extremely important to enable software usability improvements. However, existing design pattern detection approaches and tools suffer from the following problems: incomplete description of design pattern instances, inaccurate behavioral constraint checking, and inability to support novel design patterns. This paper presents a general framework to detect design patterns while solving these issues by combining static and dynamic analysis techniques. The framework has been instantiated for typical behavioral and creational patterns, such as the observer pattern, state pattern, strategy pattern, and singleton pattern to demonstrate the applicability. Based on the open-source process mining toolkit ProM, we have developed an integrated tool that supports the whole detection process for these patterns. We applied and evaluated the framework using software execution data containing around 1,000,000 method calls generated from eight synthetic software systems and three open-source software systems. The evaluation results show that our approach can guarantee a higher precision and recall than existing approaches and can distinguish state and strategy patterns that are indistinguishable by the state-of-the-art.


Author(s):  
S. K. Singh ◽  
A. Banerjee ◽  
R. K. Varma ◽  
S. Adhikari ◽  
S. Das

2018 ◽  
Vol 18 (02) ◽  
pp. 1850017 ◽  
Author(s):  
Iwona Adamiec-Wójcik ◽  
Łukasz Drąg ◽  
Stanisław Wojciech

The static and dynamic analysis of slender systems, which in this paper comprise lines and flexible links of manipulators, requires large deformations to be taken into consideration. This paper presents a modification of the rigid finite element method which enables modeling of such systems to include bending, torsional and longitudinal flexibility. In the formulation used, the elements into which the link is divided have seven DOFs. These describe the position of a chosen point, the extension of the element, and its orientation by means of the Euler angles Z[Formula: see text]Y[Formula: see text]X[Formula: see text]. Elements are connected by means of geometrical constraint equations. A compact algorithm for formulating and integrating the equations of motion is given. Models and programs are verified by comparing the results to those obtained by analytical solution and those from the finite element method. Finally, they are used to solve a benchmark problem encountered in nonlinear dynamic analysis of multibody systems.


2002 ◽  
Vol 72 (6-7) ◽  
pp. 483-497 ◽  
Author(s):  
K. G. Tsepoura ◽  
S. Papargyri-Beskou ◽  
D. Polyzos ◽  
D. E. Beskos

Sign in / Sign up

Export Citation Format

Share Document