Results 31 to 40 of about 341,662 (337)

EtWExplorer: Multi-Priority Scheduling Path Exploration Technology Based on Abstract Syntax Tree Analysis

open access: yesApplied Sciences, 2022
Symbolic execution is well known as a dynamic vulnerability discovery technique. Its greatest advantage is the capability to analyze the execution information of the program and to explore the path in the program deterministically.
Xinglu He, Pengfei Wang, Kai Lu, Xu Zhou
doaj   +1 more source

Long short‐term memory on abstract syntax tree for SQL injection detection

open access: yesIET Software, 2021
SQL injection attack (SQLIA) is a code injection technique, used to attack data‐driven applications by executing malicious SQL statements. Techniques like pattern matching, software testing and grammar analysis etc.
Z. Zhuo, T. Cai, X. Zhang, F. Lv
doaj   +1 more source

Abstract-Syntax-Driven Development of Oberon-0 Using YAJCo

open access: yesJournal of Information and Organizational Sciences, 2019
YAJCo is a tool for the development of software languages based on an annotated language model. The model is represented by Java classes with annotations defining their mapping to concrete syntax. This approach to language definition enables the abstract
Sergej Chodarev, Michaela Bačíková
doaj   +1 more source

Deep Forest and Pruned Syntax Tree-Based Classification Method for Java Code Vulnerability

open access: yesMathematics, 2023
The rapid development of J2EE (Java 2 Platform Enterprise Edition) has brought unprecedented severe challenges to vulnerability mining. The current abstract syntax tree-based source code vulnerability classification method does not eliminate irrelevant ...
Jiaman Ding, Weikang Fu, Lianyin Jia
doaj   +1 more source

FAM: Featuring Android Malware for Deep Learning-Based Familial Analysis

open access: yesIEEE Access, 2022
To handle relentlessly emerging Android malware, deep learning has been widely adopted in the research community. Prior work proposed deep learning-based approaches that use different features of malware, and reported a high accuracy in malware detection,
Younghoon Ban   +4 more
doaj   +1 more source

Programming type-safe transformations using higher-order abstract syntax

open access: yesJournal of Formalized Reasoning, 2015
When verifying that compiler phases preserve some property of the compiled program, a major difficulty resides in how to represent and manipulate variable bindings, often imposing extra complexity both on the compiler writer and the verification effort ...
Olivier Savary Belanger   +2 more
doaj   +1 more source

JACLNet:Application of adaptive code length network in JavaScript malicious code detection.

open access: yesPLoS ONE, 2022
Currently, JavaScript malicious code detection methods are becoming more and more effective. Still, the existing methods based on deep learning are poor at detecting too long or too short JavaScript code.
Zhining Zhang   +5 more
doaj   +1 more source

SYNTAX I score is associated with genetically confirmed familial hypercholesterolemia in chinese patients with coronary heart disease. [PDF]

open access: yesBMC Cardiovasc Disord
Background Familial hypercholesterolemia (FH) is a genetically inherited disorder caused by monogenic mutations or polygenic deleterious variants. Patients with FH innate with significantly elevated risks for coronary heart disease (CHD).
Wang Y, Li C, Zhao W, Dong Y, Wang P.
europepmc   +2 more sources

Abstract Syntax Tree Based Source Code Antiplagiarism System for Large Projects Set

open access: yesIEEE Access, 2020
The paper deals with the issue of detecting plagiarism in source code, which we unfortunately encounter when teaching subjects dealing with programming and software development.
Michal Duracik   +3 more
doaj   +1 more source

Circulating TREM2 as a noninvasive diagnostic biomarker for NASH in patients with elevated liver stiffness

open access: yesHepatology, EarlyView., 2022
Abstract Background and Aims Reliable noninvasive biomarkers are an unmet clinical need for the diagnosis of NASH. This study investigates the diagnostic accuracy of the circulating triggering receptor expressed on myeloid cells 2 (plasma TREM2) as a biomarker for NASH in patients with NAFLD and elevated liver stiffness.
Vineesh Indira Chandran   +17 more
wiley   +1 more source

Home - About - Disclaimer - Privacy