Introduction to Api Calls
Sentence Examples
Discover more insights into Api Calls
Keywords frequently search together with Api Calls
Narrow sentence examples with built-in keyword filters
Api Calls sentence examples within Sensitive Api Calls
After obtaining the central nodes, the average intimacies between sensitive API calls and central nodes are computed to represent the semantic features of the graphs.
After obtaining the central nodes, the average intimacies between sensitive API calls and central nodes are computed to represent the semantic features of the graphs.
Full Text
We transform the app by placing a wrapper around the app, called App2SecApp, to ensures safe executional monitoring in terms of: (1) behavioral invariance of the app, and (2) monitoring of sensitive API calls and prompting the user, if there is a possible leakage from the app's sandbox through any of the API calls.
We transform the app by placing a wrapper around the app, called App2SecApp, to ensures safe executional monitoring in terms of: (1) behavioral invariance of the app, and (2) monitoring of sensitive API calls and prompting the user, if there is a possible leakage from the app's sandbox through any of the API calls.
Full Text
Api Calls sentence examples within Rest Api Calls
Our main idea is to granularly manage application permissions and encrypt REST API calls to defend against malicious attacks.
Our main idea is to granularly manage application permissions and encrypt REST API calls to defend against malicious attacks.
Full Text
The proposed multi-level memory scheduling method places data in a key-value storage, flushes sensor data when the edge memory is full, and reduces the number of I/O operations, network latency, and the number of REST API calls in the edge cloud.
The proposed multi-level memory scheduling method places data in a key-value storage, flushes sensor data when the edge memory is full, and reduces the number of I/O operations, network latency, and the number of REST API calls in the edge cloud.
Full Text
Api Calls sentence examples within Window Api Calls
The other major contribution in this paper is identifying the Windows API calls for each of the adversary techniques based on the MITRE ATT&CK.
The other major contribution in this paper is identifying the Windows API calls for each of the adversary techniques based on the MITRE ATT&CK.
Full Text
Learn more from Api Calls
Api Calls sentence examples within Onemap Api Calls
More Api Calls sentence examples
10.1109/UBMK52708.2021.9559020
With these methods, data is created by reading the information in the file without running the malicious software, or by examining the places it affects such as changes on the network at runtime, api calls.
With these methods, data is created by reading the information in the file without running the malicious software, or by examining the places it affects such as changes on the network at runtime, api calls.
Full Text
More Api Calls sentence examples
10.1016/J.ASOC.2021.107506
However, it is troublesome to insert API calls into the original sequence to cover the malicious purpose with implementation on GAN.
However, it is troublesome to insert API calls into the original sequence to cover the malicious purpose with implementation on GAN.
Full Text
More Api Calls sentence examples
10.30591/SMARTCOMP.V10I1.2190
For solve this problem, this research proposed antivirus signature based on DLL Files and API Calls of ransomware files.
For solve this problem, this research proposed antivirus signature based on DLL Files and API Calls of ransomware files.
Full Text
More Api Calls sentence examples
10.13052/JCSM2245-1439.1036
In this paper, we propose a malware classification model with RNN, especially the long short-term memory (LSTM) and the gated recurrent unit (GRU), to classify variants of malware by using long-sequences of API calls.
In this paper, we propose a malware classification model with RNN, especially the long short-term memory (LSTM) and the gated recurrent unit (GRU), to classify variants of malware by using long-sequences of API calls.
Full Text
More Api Calls sentence examples
10.3390/fi13030058
The results reveal a multitude of issues, ranging from an over-claim of sensitive permissions and the use of possibly privacy-invasive API calls, to numerous potentially exploitable CWE and CVE-identified weaknesses and vulnerabilities, the, in some cases, excessive employment of third-party trackers, and a number of other flaws related to the use of third-party software libraries, unsanitised input, and weak user password policies, to mention just a few.
The results reveal a multitude of issues, ranging from an over-claim of sensitive permissions and the use of possibly privacy-invasive API calls, to numerous potentially exploitable CWE and CVE-identified weaknesses and vulnerabilities, the, in some cases, excessive employment of third-party trackers, and a number of other flaws related to the use of third-party software libraries, unsanitised input, and weak user password policies, to mention just a few.
Full Text
More Api Calls sentence examples
10.1145/3456669.3456681
By instrumenting Codeplay’s ComputeAorta[2] OpenCL implementation, it is possible to record OpenCL API calls and to reconstruct the execution graph as seen by the OpenCL device driver.
By instrumenting Codeplay’s ComputeAorta[2] OpenCL implementation, it is possible to record OpenCL API calls and to reconstruct the execution graph as seen by the OpenCL device driver.
Full Text
More Api Calls sentence examples
10.3233/sw-210439
Through the creation of source-specific textual configuration files, RAMOSE enables the querying of SPARQL endpoints via simple Web RESTful API calls that return either JSON or CSV-formatted data, thus hiding all the intrinsic complexities of SPARQL and RDF from common Web users.
Through the creation of source-specific textual configuration files, RAMOSE enables the querying of SPARQL endpoints via simple Web RESTful API calls that return either JSON or CSV-formatted data, thus hiding all the intrinsic complexities of SPARQL and RDF from common Web users.
Full Text
More Api Calls sentence examples
10.1109/ICACCS51430.2021.9441956
The other major contribution in this paper is identifying the Windows API calls for each of the adversary techniques based on the MITRE ATT&CK.
The other major contribution in this paper is identifying the Windows API calls for each of the adversary techniques based on the MITRE ATT&CK.
Full Text
More Api Calls sentence examples
10.1200/CCI.21.00018
A total of 77,702 API calls processed an estimated 167,179 text records, which took a total of 1,979 processing-minutes (33.
A total of 77,702 API calls processed an estimated 167,179 text records, which took a total of 1,979 processing-minutes (33.
Full Text
More Api Calls sentence examples
10.1186/s13321-021-00502-6
With ChemProps, other polymer databases can remove duplicate entries and enable a more accurate “search by SMILES” function by using ChemProps as a common name-to-SMILES translator through API calls.
With ChemProps, other polymer databases can remove duplicate entries and enable a more accurate “search by SMILES” function by using ChemProps as a common name-to-SMILES translator through API calls.
Full Text
More Api Calls sentence examples
10.3390/ELECTRONICS10040432
We serialize the key function in light of the sequence of API calls and pick up a similar module that captures the global semantics of malware.
We serialize the key function in light of the sequence of API calls and pick up a similar module that captures the global semantics of malware.
Full Text
More Api Calls sentence examples
10.1109/ICSE-Companion52605.2021.00022
Manually detecting and replacing deprecated APIs is a tedious and time-consuming task due to the large number of API calls used in the projects.
Manually detecting and replacing deprecated APIs is a tedious and time-consuming task due to the large number of API calls used in the projects.
Full Text
More Api Calls sentence examples
10.4230/LIPIcs.ECOOP.2021.15
This paper focuses on an important optimization opportunity in Python-hosted domain-specific languages (DSLs): the use of laziness for optimization, whereby multiple API calls are deferred and then optimized prior to execution (rather than executing eagerly, which would require executing each call in isolation).
This paper focuses on an important optimization opportunity in Python-hosted domain-specific languages (DSLs): the use of laziness for optimization, whereby multiple API calls are deferred and then optimized prior to execution (rather than executing eagerly, which would require executing each call in isolation).
Full Text
More Api Calls sentence examples
10.1109/RDAAPS48126.2021.9452002
There are remarkable efforts in static and dynamic malware analysis using static features and API calls respectively.
There are remarkable efforts in static and dynamic malware analysis using static features and API calls respectively.
Full Text
More Api Calls sentence examples
10.1186/s12939-021-01554-8
sg) was matched to postal code and geographical coordinates via OneMAP API calls.
sg) was matched to postal code and geographical coordinates via OneMAP API calls.
Full Text
More Api Calls sentence examples
10.1145/3453483.3454084
The main challenge is to synthesize well-typed Rust programs to account for proper chaining of API calls and Rust’s ownership type system and polymorphic types.
The main challenge is to synthesize well-typed Rust programs to account for proper chaining of API calls and Rust’s ownership type system and polymorphic types.
Full Text
More Api Calls sentence examples
10.4258/hir.2021.27.1.39
Methods For images, pseudonymization of PIDs is done using API calls that receive PIDs present in Digital Imaging and Communications in Medicine (DICOM) headers and returns the pseudonymized identifiers.
Methods For images, pseudonymization of PIDs is done using API calls that receive PIDs present in Digital Imaging and Communications in Medicine (DICOM) headers and returns the pseudonymized identifiers.
Full Text
More Api Calls sentence examples
10.1109/ICSE-Companion52605.2021.00034
Furthermore, the user can extend µSE by customizing the API calls targeted by the mutation analysis.
Furthermore, the user can extend µSE by customizing the API calls targeted by the mutation analysis.
Full Text
More Api Calls sentence examples
10.5194/egusphere-egu21-9602
</p><p>The openEO H2020 project (2017-2020) has developed the API as well as an ecosystem of software around it, including clients (JavaScript, Python, R, QGIS, browser-based), back-ends that translate API calls into existing image analysis or GIS software or services (for Sentinel Hub, WCPS, Open Data Cube, GRASS GIS, GeoTrellis/GeoPySpark, and GEE) as well as a hub that allows querying and searching openEO providers for their capabilities and datasets.
</p><p>The openEO H2020 project (2017-2020) has developed the API as well as an ecosystem of software around it, including clients (JavaScript, Python, R, QGIS, browser-based), back-ends that translate API calls into existing image analysis or GIS software or services (for Sentinel Hub, WCPS, Open Data Cube, GRASS GIS, GeoTrellis/GeoPySpark, and GEE) as well as a hub that allows querying and searching openEO providers for their capabilities and datasets.
Full Text
More Api Calls sentence examples
10.1007/s12652-020-01837-y
For the purpose of detect malware injection The hypervisor injection attack proposed in this paper by using a method of X-cross application programming interface calls (API-HI-attack) raises awareness that malware is injecting into the simulation tool with X-cross-language API calls.
For the purpose of detect malware injection The hypervisor injection attack proposed in this paper by using a method of X-cross application programming interface calls (API-HI-attack) raises awareness that malware is injecting into the simulation tool with X-cross-language API calls.
Full Text
More Api Calls sentence examples
10.1051/JNWPU/20213920448
With package structures and API calls being used as features, the classifying of those candidates is accomplished through coarse and fine-grained filtering.
With package structures and API calls being used as features, the classifying of those candidates is accomplished through coarse and fine-grained filtering.
Full Text
More Api Calls sentence examples
10.21203/RS.3.RS-428309/V1
sg) was matched to postal code and geographical coordinates via OneMAP API calls.
sg) was matched to postal code and geographical coordinates via OneMAP API calls.
Full Text
More Api Calls sentence examples
10.1109/SANER50967.2021.00013
However, they fail to exploit the high-order connectivity of the interaction of API calls and the structural information of software projects.
However, they fail to exploit the high-order connectivity of the interaction of API calls and the structural information of software projects.
Full Text
More Api Calls sentence examples
10.1109/TSE.2021.3068901
Additionally, by analyzing all external package API calls in these JavaScript files, we found that a high percentage of these API calls are attributed to trivial packages.
Additionally, by analyzing all external package API calls in these JavaScript files, we found that a high percentage of these API calls are attributed to trivial packages.
Full Text
More Api Calls sentence examples
10.1371/journal.pone.0251867
The first encompasses permissions, API calls, and possible connections to external URLs, while the second concentrates on potential security weaknesses and vulnerabilities, including the use of trackers, in-depth manifest analysis, shared software analysis, and taint analysis.
The first encompasses permissions, API calls, and possible connections to external URLs, while the second concentrates on potential security weaknesses and vulnerabilities, including the use of trackers, in-depth manifest analysis, shared software analysis, and taint analysis.
Full Text
More Api Calls sentence examples
10.1007/S11416-020-00371-X
Countermeasures of the detection methods could consist in fixing the bug exploited in the analysis tool or directly modifying results returned by API calls or handling self-modifying code in a smart way.
Countermeasures of the detection methods could consist in fixing the bug exploited in the analysis tool or directly modifying results returned by API calls or handling self-modifying code in a smart way.
Full Text
More Api Calls sentence examples
10.1016/J.ASOC.2021.107234
Malware developers use complex techniques to produce malware variants, by removing, replacing, and adding useless API calls to the code, which are specifically designed to evade detection mechanisms, as well as do not affect the original functionality of the malicious code involved.
Malware developers use complex techniques to produce malware variants, by removing, replacing, and adding useless API calls to the code, which are specifically designed to evade detection mechanisms, as well as do not affect the original functionality of the malicious code involved.
Full Text
More Api Calls sentence examples
10.1016/J.COSE.2021.102250
In this work, we configure several feature sets for dynamic malware detection extracted from API calls, including an alternative scheme grouping calls in categories, network activity, signatures from the Cuckoo sandbox report, and some interactions with the file system and registry.
In this work, we configure several feature sets for dynamic malware detection extracted from API calls, including an alternative scheme grouping calls in categories, network activity, signatures from the Cuckoo sandbox report, and some interactions with the file system and registry.
Full Text
More Api Calls sentence examples
10.17212/2782-2001-2021-3-37-52
In this paper, it is proposed to use NLP methods, such as word embedding, and LDA in relation to the problems of analyzing malware API calls sequences in order to reveal the presence of semantic dependencies and assess the effectiveness of the application of these methods.
In this paper, it is proposed to use NLP methods, such as word embedding, and LDA in relation to the problems of analyzing malware API calls sequences in order to reveal the presence of semantic dependencies and assess the effectiveness of the application of these methods.
Full Text
More Api Calls sentence examples
10.1142/S021819402140009X
Application executions are represented by sequences of consecutive API calls.
Application executions are represented by sequences of consecutive API calls.
Full Text
More Api Calls sentence examples
10.1145/3433210.3457894
However, these countermeasures rely heavily on identifying specific API calls, which has significant limitations as these calls can be misleading or hidden from the analyst.
However, these countermeasures rely heavily on identifying specific API calls, which has significant limitations as these calls can be misleading or hidden from the analyst.
Full Text
More Api Calls sentence examples
10.1016/j.future.2020.10.020
Beyond package embedding, we use keywords and API calls as resilient features, which reflect the programmer’s intention and style.
Beyond package embedding, we use keywords and API calls as resilient features, which reflect the programmer’s intention and style.
Full Text
More Api Calls sentence examples
10.1145/3442588
After obtaining the central nodes, the average intimacies between sensitive API calls and central nodes are computed to represent the semantic features of the graphs.
After obtaining the central nodes, the average intimacies between sensitive API calls and central nodes are computed to represent the semantic features of the graphs.
Full Text
More Api Calls sentence examples
10.21105/joss.03255
, processing and visualizing 3D data can be achieved by few lines of API calls).
, processing and visualizing 3D data can be achieved by few lines of API calls).
Full Text
More Api Calls sentence examples
10.1007/s11432-019-2745-5
Hence, various API mining techniques have been introduced to mine API usage patterns about the co-occurring of API calls or pre-conditions of API calls.
Hence, various API mining techniques have been introduced to mine API usage patterns about the co-occurring of API calls or pre-conditions of API calls.
Full Text
More Api Calls sentence examples
10.21203/RS.3.RS-508107/V1
This paper used Debug application programming interface (API) technology to obtain the features of API calls as viruses, filtered API calls according to information entropy, and finally used the support vector machine (SVM) model for virus detection.
This paper used Debug application programming interface (API) technology to obtain the features of API calls as viruses, filtered API calls according to information entropy, and finally used the support vector machine (SVM) model for virus detection.
Full Text
More Api Calls sentence examples
10.1109/ACCESS.2021.3077295
In our unique method, a sequence of system API calls is extracted using tracker filter drivers in a sandbox environment.
In our unique method, a sequence of system API calls is extracted using tracker filter drivers in a sandbox environment.
Full Text
More Api Calls sentence examples
10.1109/TSE.2019.2893207
But the execution of callbacks can also come from direct calls of the framework (API calls).
But the execution of callbacks can also come from direct calls of the framework (API calls).
Full Text
More Api Calls sentence examples
10.1145/3485537
In an empirical evaluation on 12 subject applications containing 316 synchronous API calls, Desynchronizer identified 256 of these as candidates for refactoring.
In an empirical evaluation on 12 subject applications containing 316 synchronous API calls, Desynchronizer identified 256 of these as candidates for refactoring.
Full Text
More Api Calls sentence examples
10.1145/3430984.3431002
Moreover, involving clarification questions and user feedbacks makes the system unusable by one shot API calls, which is the most intuitive usage among common use cases in industry like automated report generation.
Moreover, involving clarification questions and user feedbacks makes the system unusable by one shot API calls, which is the most intuitive usage among common use cases in industry like automated report generation.
Full Text
More Api Calls sentence examples
10.1109/tse.2021.3059907
We designed and implemented FOCUS as a novel approach to provide developers with API calls and source code while they are programming.
We designed and implemented FOCUS as a novel approach to provide developers with API calls and source code while they are programming.
Full Text
More Api Calls sentence examples
10.5121/IJNSA.2021.13201
We used a 1-Dimensional CNN by mapping API calls as categorical and term frequency-inverse document frequency (TF-IDF) vectors and compared the results to other classification techniques.
We used a 1-Dimensional CNN by mapping API calls as categorical and term frequency-inverse document frequency (TF-IDF) vectors and compared the results to other classification techniques.
Full Text
More Api Calls sentence examples
10.1007/978-981-33-6815-6_4
There are different languages like Python, MATLAB, R and much more which have libraries for statistical mathematics and make simple API calls to do the required experiments within any dataset.
There are different languages like Python, MATLAB, R and much more which have libraries for statistical mathematics and make simple API calls to do the required experiments within any dataset.
Full Text
More Api Calls sentence examples
10.1007/s13042-020-01238-9
In this study, we consider permission and API calls as features that help in developing a model for malware detection.
In this study, we consider permission and API calls as features that help in developing a model for malware detection.
Full Text
More Api Calls sentence examples
10.1109/ICSE43902.2021.00102
Since accessing and sending data is usually done via API calls, tracking the data flow between source and sink API is often the method of choice.
Since accessing and sending data is usually done via API calls, tracking the data flow between source and sink API is often the method of choice.
Full Text
More Api Calls sentence examples
10.4108/eai.14-7-2021.170291
Ubi-Interact lets users build real-time systems with modular components that can separate system behaviour from base API calls, leaving the user free to explore and maintain a combination of software and hardware each running in their native environment.
Ubi-Interact lets users build real-time systems with modular components that can separate system behaviour from base API calls, leaving the user free to explore and maintain a combination of software and hardware each running in their native environment.
Full Text
More Api Calls sentence examples
10.1016/J.MATPR.2021.07.064
And also further deploy it in such a way that it'll be easy to integrate and easy to use with API calls.
And also further deploy it in such a way that it'll be easy to integrate and easy to use with API calls.
Full Text
More Api Calls sentence examples
10.1145/3437963.3441695
We also illustrate how to train birdspotter into a fully-fledged bot detector that achieves better than state-of-the-art performances without making Twitter API calls, and we showcase its usage in an exploratory analysis of a topical COVID-19 dataset.
We also illustrate how to train birdspotter into a fully-fledged bot detector that achieves better than state-of-the-art performances without making Twitter API calls, and we showcase its usage in an exploratory analysis of a topical COVID-19 dataset.
Full Text
More Api Calls sentence examples
10.1145/3468264.3473491
Our approach has been integrated into RESTest, a state-of-the-art tool for API testing, achieving an unprecedented level of automation which allows to generate up to 100% more valid API calls than existing fuzzing techniques, 30% on average.
Our approach has been integrated into RESTest, a state-of-the-art tool for API testing, achieving an unprecedented level of automation which allows to generate up to 100% more valid API calls than existing fuzzing techniques, 30% on average.
Full Text
More Api Calls sentence examples
10.1007/S11416-021-00388-W
The evaluation, considering 1000 legitimate and ransomware applications, demonstrates that the hybrid API calls-based detection can be proved to be a promising direction in ransomware prevention and mitigation.
The evaluation, considering 1000 legitimate and ransomware applications, demonstrates that the hybrid API calls-based detection can be proved to be a promising direction in ransomware prevention and mitigation.
Full Text
More Api Calls sentence examples
10.18653/v1/2021.acl-long.55
It is also the key component for being able to predict API calls accurately.
It is also the key component for being able to predict API calls accurately.
Full Text
More Api Calls sentence examples
10.1109/ICIRCA51532.2021.9544794
The recommender system is generated by applying Cosine similarity and making API Calls.
The recommender system is generated by applying Cosine similarity and making API Calls.
Full Text
More Api Calls sentence examples
10.1016/J.JPDC.2020.09.006
Our main idea is to granularly manage application permissions and encrypt REST API calls to defend against malicious attacks.
Our main idea is to granularly manage application permissions and encrypt REST API calls to defend against malicious attacks.
Full Text
More Api Calls sentence examples
10.1109/DSN48987.2021.00063
Atop this new inter-procedural analysis, we further adjust the traditional backward slicing and forward constant propagation to provide the complete dataflow tracking of sink API calls.
Atop this new inter-procedural analysis, we further adjust the traditional backward slicing and forward constant propagation to provide the complete dataflow tracking of sink API calls.
Full Text
More Api Calls sentence examples
10.1145/3412841.3442102
We transform the app by placing a wrapper around the app, called App2SecApp, to ensures safe executional monitoring in terms of: (1) behavioral invariance of the app, and (2) monitoring of sensitive API calls and prompting the user, if there is a possible leakage from the app's sandbox through any of the API calls.
We transform the app by placing a wrapper around the app, called App2SecApp, to ensures safe executional monitoring in terms of: (1) behavioral invariance of the app, and (2) monitoring of sensitive API calls and prompting the user, if there is a possible leakage from the app's sandbox through any of the API calls.
Full Text
More Api Calls sentence examples
10.5220/0010377907330742
Modern malware classification techniques rely on machine learning models that can be trained on features such as opcode sequences, API calls, and byte n-grams, among many others.
Modern malware classification techniques rely on machine learning models that can be trained on features such as opcode sequences, API calls, and byte n-grams, among many others.
Full Text
More Api Calls sentence examples
10.3390/ELECTRONICS10080972
The proposed multi-level memory scheduling method places data in a key-value storage, flushes sensor data when the edge memory is full, and reduces the number of I/O operations, network latency, and the number of REST API calls in the edge cloud.
The proposed multi-level memory scheduling method places data in a key-value storage, flushes sensor data when the edge memory is full, and reduces the number of I/O operations, network latency, and the number of REST API calls in the edge cloud.
Full Text
More Api Calls sentence examples
10.1007/s10664-020-09897-6
Our objective is to measure the current practice of declared SDK versions (which we term as DSDK versions afterwards) in real apps, and the (in)consistency between DSDK versions and their host apps’ API calls.
Our objective is to measure the current practice of declared SDK versions (which we term as DSDK versions afterwards) in real apps, and the (in)consistency between DSDK versions and their host apps’ API calls.
Full Text
More Api Calls sentence examples
10.1109/PIMRCW.2019.8880840
The framework extracts requested permissions and API calls from Android malware samples and uses them as features to train a large set of machine learning classifiers.
The framework extracts requested permissions and API calls from Android malware samples and uses them as features to train a large set of machine learning classifiers.
Full Text
More Api Calls sentence examples
10.1007/S00500-019-03755-4
Furthermore, all the existing methods use the features obtained only from the app stores such as description and rating, which could be inaccurate, varied in different stores, and affected by language barrier; they totally neglect useful information clearly capturing the app’s functionalities and behaviors that can be mined from the apps themselves such as the API calls and manifest information.
Furthermore, all the existing methods use the features obtained only from the app stores such as description and rating, which could be inaccurate, varied in different stores, and affected by language barrier; they totally neglect useful information clearly capturing the app’s functionalities and behaviors that can be mined from the apps themselves such as the API calls and manifest information.
Full Text
More Api Calls sentence examples
10.1109/ICoCSec47621.2019.8971017
We discussed about dynamic analysis and Windows API Calls.
We discussed about dynamic analysis and Windows API Calls.
Full Text
More Api Calls sentence examples
10.1016/J.JSS.2019.07.001
Then, it builds clones that mimic the application code in terms of the type of operations, the number and size of network calls with external servers and API calls made at different layers of the technology stack.
Then, it builds clones that mimic the application code in terms of the type of operations, the number and size of network calls with external servers and API calls made at different layers of the technology stack.
Full Text
More Api Calls sentence examples
10.1049/IET-IFS.2018.5268
In this study, the authors extract sequences of API calls using dynamic analysis and then use colour mapping rules to create feature images representing malware behaviour.
In this study, the authors extract sequences of API calls using dynamic analysis and then use colour mapping rules to create feature images representing malware behaviour.
Full Text
More Api Calls sentence examples
10.1007/978-3-030-30619-9_6
It builds a complete call graph for Android applications and identifies call traces from entry methods to sensitive API calls.
It builds a complete call graph for Android applications and identifies call traces from entry methods to sensitive API calls.
Full Text
More Api Calls sentence examples
10.1145/3307334.3326096
M2 introduces a new data-centric approach that leverages higher-level device abstractions and hardware acceleration to efficiently share device data, not API calls.
M2 introduces a new data-centric approach that leverages higher-level device abstractions and hardware acceleration to efficiently share device data, not API calls.
Full Text
More Api Calls sentence examples
10.1145/3307334.3326097
Based on the preliminary studies, we design LpGL so that it uses the device's gaze/head orientation information and geometry data to infer user perception information, intercepts application-level graphics API calls, and employs frame rate control, mesh simplification, and culling techniques to enhance energy efficiency of AR headsets without detriment of user experience.
Based on the preliminary studies, we design LpGL so that it uses the device's gaze/head orientation information and geometry data to infer user perception information, intercepts application-level graphics API calls, and employs frame rate control, mesh simplification, and culling techniques to enhance energy efficiency of AR headsets without detriment of user experience.
Full Text
More Api Calls sentence examples
10.1109/QRS-C.2019.00027
Most previous malware detection approaches mainly rely on features such as permissions, API calls, and opcode sequences.
Most previous malware detection approaches mainly rely on features such as permissions, API calls, and opcode sequences.
Full Text
More Api Calls sentence examples
10.3897/BISS.3.38627
Ideally, our presentation would be based on API calls to the data itself, eliminating the need to transform and re-load after every change.
Ideally, our presentation would be based on API calls to the data itself, eliminating the need to transform and re-load after every change.
Full Text
More Api Calls sentence examples
10.1109/BigData47090.2019.9005981
We then propose a method to convert the multiple sequential data (API calls) to a family behavior graph for further analysis.
We then propose a method to convert the multiple sequential data (API calls) to a family behavior graph for further analysis.
Full Text
More Api Calls sentence examples
10.1007/s11280-019-00675-z
The method monitors behavior points based on API calls and then uses the calling sequence of those behavior points at runtime to construct a behavior chain.
The method monitors behavior points based on API calls and then uses the calling sequence of those behavior points at runtime to construct a behavior chain.
Full Text
More Api Calls sentence examples
10.1088/1742-6596/1176/2/022045
However, many security risks have arisen due to improper usage of these libraries mainly due to the wrong sequence of API calls.
However, many security risks have arisen due to improper usage of these libraries mainly due to the wrong sequence of API calls.
Full Text
More Api Calls sentence examples
10.1007/978-1-4842-5431-8_3
You can use REST API calls to automate the configuration as part of the infrastructure automation.
You can use REST API calls to automate the configuration as part of the infrastructure automation.
Full Text
More Api Calls sentence examples
10.1109/ICAC49085.2019.9103416
In this paper, we investigate the four predominant domains of registry, DLL, API calls and network connections in memory forensics to implement the system ‘Malfore,’ which helps automate the entire process of memory forensics.
In this paper, we investigate the four predominant domains of registry, DLL, API calls and network connections in memory forensics to implement the system ‘Malfore,’ which helps automate the entire process of memory forensics.
Full Text
More Api Calls sentence examples
10.1109/CCST.2019.8888430
In this paper, we provide the second part of the CICAndMal2017 dataset [16] publicly available which includes permissions and intents as static features, and API calls as dynamic features.
In this paper, we provide the second part of the CICAndMal2017 dataset [16] publicly available which includes permissions and intents as static features, and API calls as dynamic features.
Full Text
More Api Calls sentence examples
10.1145/3331184.3331318
These paths chain together API calls and use the output of executed APIs as inputs to others.
These paths chain together API calls and use the output of executed APIs as inputs to others.
Full Text
More Api Calls sentence examples
10.1109/CIC48465.2019.00050
By working with various app features such as binary N-grams of API calls, we will generate feature sets consisting of a selected range of binary N-grams.
By working with various app features such as binary N-grams of API calls, we will generate feature sets consisting of a selected range of binary N-grams.
Full Text
More Api Calls sentence examples
10.1109/SIU.2019.8806571
In this study, an LSTM based classification method was developed by using API calls of 8 different types of real malware.
In this study, an LSTM based classification method was developed by using API calls of 8 different types of real malware.
Full Text
More Api Calls sentence examples
10.3844/JCSSP.2019.1307.1319
There are many researches done in this field, however, most researchers used n-gram to detect the sequence of API calls and although it gave good results, it is time consuming to process through all the output.
There are many researches done in this field, however, most researchers used n-gram to detect the sequence of API calls and although it gave good results, it is time consuming to process through all the output.
Full Text
More Api Calls sentence examples
10.1109/ACCESS.2019.2948212
Firstly, the API calls are obtained through static analysis to generate API call graphs that contain the relationships among APIs.
Firstly, the API calls are obtained through static analysis to generate API call graphs that contain the relationships among APIs.
Full Text
More Api Calls sentence examples
10.1109/IEMCON.2019.8936216
API management and classification is a cumbersome task considering the rapid increase in the number of APIs, and API to API calls.
API management and classification is a cumbersome task considering the rapid increase in the number of APIs, and API to API calls.
Full Text
More Api Calls sentence examples
10.1109/ISKE47853.2019.9170375
The proposed model uses a new and unique mapping technique between each Facebook Like object to their corresponding Facebook page category/sub-category object extracted from the API calls as Likes metadata, which is then evaluated as features for a set of machine learning algorithms to predict individual psychodemographic profiles from users Likes.
The proposed model uses a new and unique mapping technique between each Facebook Like object to their corresponding Facebook page category/sub-category object extracted from the API calls as Likes metadata, which is then evaluated as features for a set of machine learning algorithms to predict individual psychodemographic profiles from users Likes.
Full Text
More Api Calls sentence examples
10.1109/Informatics47936.2019.9119302
In this paper, we describe how the API developer can use patterns to map sentences to API calls by utilizing the similarities between names and types in the sentences and the API.
In this paper, we describe how the API developer can use patterns to map sentences to API calls by utilizing the similarities between names and types in the sentences and the API.
Full Text
More Api Calls sentence examples
10.1162/dint_a_00013
Since the release in 2016, Microsoft Concept Graph has received more than 100,000 pageviews, 2 million API calls and 3,000 registered downloads from 50,000 visitors over 64 countries.
Since the release in 2016, Microsoft Concept Graph has received more than 100,000 pageviews, 2 million API calls and 3,000 registered downloads from 50,000 visitors over 64 countries.
Full Text
Learn more from Api Calls
Keywords related to Api
Api 5l
Api X60
Api G
Api X80
Api Berbasis
Api Recommendation
Api Logistik
Api Pada
Api X120
Api X100
Api Standard
Api Service
Api X70
Api 12f
Api Di
Api X52
Api X 65
Api Indonesia
Api Evolution
Api Misuses
Api Documentation
Api Dependency
Api X65
Api Misuse
Api Design
Api Usage
Api Bandara
Api Call
Api 5ct
Explore More
Keywords related to Calls
Method Calls
Advertisement Calls
911 Calls
Echolocation Calls
Mobbing Calls
Service Calls
Mating Calls
Phone Calls
Telephone Calls
Contact Calls
Whale Calls
Conspecific Calls
Bird Calls
Response Calls
Emergency Calls
Exposure Calls
Voice Calls
Loud Calls
22 Khz Calls
House Calls
Nurse Calls
Health Calls
Begging Calls
Video Calls
Alarm Calls
Pandemic Calls
Police Calls
Cuckoo Calls
System Calls
Variant Calls
Conference Calls
Weekly Calls
Team Calls
Ambulance Calls
Distress Calls
Explore More
Api Calls
Encyclopedia