Results 31 to 40 of about 341,662 (337)
Symbolic execution is well known as a dynamic vulnerability discovery technique. Its greatest advantage is the capability to analyze the execution information of the program and to explore the path in the program deterministically.
Xinglu He, Pengfei Wang, Kai Lu, Xu Zhou
doaj +1 more source
Long short‐term memory on abstract syntax tree for SQL injection detection
SQL injection attack (SQLIA) is a code injection technique, used to attack data‐driven applications by executing malicious SQL statements. Techniques like pattern matching, software testing and grammar analysis etc.
Z. Zhuo, T. Cai, X. Zhang, F. Lv
doaj +1 more source
Abstract-Syntax-Driven Development of Oberon-0 Using YAJCo
YAJCo is a tool for the development of software languages based on an annotated language model. The model is represented by Java classes with annotations defining their mapping to concrete syntax. This approach to language definition enables the abstract
Sergej Chodarev, Michaela Bačíková
doaj +1 more source
Deep Forest and Pruned Syntax Tree-Based Classification Method for Java Code Vulnerability
The rapid development of J2EE (Java 2 Platform Enterprise Edition) has brought unprecedented severe challenges to vulnerability mining. The current abstract syntax tree-based source code vulnerability classification method does not eliminate irrelevant ...
Jiaman Ding, Weikang Fu, Lianyin Jia
doaj +1 more source
FAM: Featuring Android Malware for Deep Learning-Based Familial Analysis
To handle relentlessly emerging Android malware, deep learning has been widely adopted in the research community. Prior work proposed deep learning-based approaches that use different features of malware, and reported a high accuracy in malware detection,
Younghoon Ban+4 more
doaj +1 more source
Programming type-safe transformations using higher-order abstract syntax
When verifying that compiler phases preserve some property of the compiled program, a major difficulty resides in how to represent and manipulate variable bindings, often imposing extra complexity both on the compiler writer and the verification effort ...
Olivier Savary Belanger+2 more
doaj +1 more source
JACLNet:Application of adaptive code length network in JavaScript malicious code detection.
Currently, JavaScript malicious code detection methods are becoming more and more effective. Still, the existing methods based on deep learning are poor at detecting too long or too short JavaScript code.
Zhining Zhang+5 more
doaj +1 more source
SYNTAX I score is associated with genetically confirmed familial hypercholesterolemia in chinese patients with coronary heart disease. [PDF]
Background Familial hypercholesterolemia (FH) is a genetically inherited disorder caused by monogenic mutations or polygenic deleterious variants. Patients with FH innate with significantly elevated risks for coronary heart disease (CHD).
Wang Y, Li C, Zhao W, Dong Y, Wang P.
europepmc +2 more sources
Abstract Syntax Tree Based Source Code Antiplagiarism System for Large Projects Set
The paper deals with the issue of detecting plagiarism in source code, which we unfortunately encounter when teaching subjects dealing with programming and software development.
Michal Duracik+3 more
doaj +1 more source
Abstract Background and Aims Reliable noninvasive biomarkers are an unmet clinical need for the diagnosis of NASH. This study investigates the diagnostic accuracy of the circulating triggering receptor expressed on myeloid cells 2 (plasma TREM2) as a biomarker for NASH in patients with NAFLD and elevated liver stiffness.
Vineesh Indira Chandran+17 more
wiley +1 more source