Results 41 to 50 of about 113,367 (297)

Function Level Code Vulnerability Detection Method of Graph Neural Network Based on Extended AST [PDF]

open access: yesJisuanji kexue, 2023
With the increase of software vulnerabilities year by year,security problems are becoming more and more serious.Vulnerability detection of original code in the delivery stage of software project can effectively avoid security vulnerabilities in later run-
GU Shouke, CHEN Wen
doaj   +1 more source

Understanding the Influence of AST-JS for Improving Malicious Webpage Detection

open access: yesApplied Sciences, 2022
JavaScript-based attacks injected into a webpage to perpetrate malicious activities are still the main problem in web security. Recent works have leveraged advances in artificial intelligence by considering many feature representations to improve the ...
Muhammad Fakhrur Rozi   +5 more
doaj   +1 more source

Barat - a front end for java [PDF]

open access: yes, 1998
This paper presents a front-end for Java, called Barat, that supports static analysis of Java programs. Barat builds a complete abstract syntax tree from Java source code files, enriched with name and type analysis information.
Bokowski, Boris, Spiegel, André
core   +1 more source

RDF Modelling and SPARQL Processing of SQL Abstract Syntax Trees

open access: green, 2012
Most enterprise systems rely on relational databases, and therefore SQL queries, to populate dynamic documents such as business intelligence reports, dashboards or spreadsheets. These queries represent metadata about the documents, thus they can feed information retrieval systems such as recommender systems or search engines.
Corentin Follenfant   +3 more
openalex   +3 more sources

An algorithm for generating abstract syntax trees [PDF]

open access: yesComputer Languages, 1985
The notion of an abstract syntax is discussed. An algorithm is presented for automatically deriving an abstract syntax directly from a BNF grammar. The implementation of this algorithm and its application to the grammar for Modula are discussed.
openaire   +2 more sources

Clone Detection and Elimination for Haskell [PDF]

open access: yes, 2010
Duplicated code is a well known problem in software maintenance and refactoring. Code clones tend to increase program size and several studies have shown that duplicated code makes maintenance and code understanding more complex and time consuming.
Brown, Christopher, Thompson, Simon
core   +1 more source

Software defect prediction using hybrid model (CBIL) of convolutional neural network (CNN) and bidirectional long short-term memory (Bi-LSTM) [PDF]

open access: yesPeerJ Computer Science, 2021
In recent years, the software industry has invested substantial effort to improve software quality in organizations. Applying proactive software defect prediction will help developers and white box testers to find the defects earlier, and this will ...
Ahmed Bahaa Farid   +3 more
doaj   +2 more sources

A Grammatical Inference Approach to Language-Based Anomaly Detection in XML [PDF]

open access: yes, 2013
False-positives are a problem in anomaly-based intrusion detection systems. To counter this issue, we discuss anomaly detection for the eXtensible Markup Language (XML) in a language-theoretic view.
Lampesberger, Harald
core   +1 more source

READSUM: Retrieval-Augmented Adaptive Transformer for Source Code Summarization

open access: yesIEEE Access, 2023
Code summarization is the process of automatically generating brief and informative summaries of source code to aid in software comprehension and maintenance.
Yunseok Choi   +3 more
doaj   +1 more source

Pointer Analysis for C Programs Through AST Traversal [PDF]

open access: yes, 2005
We present a pointer analysis algorithm designed for source-to-source transformations. Existing techniques for pointer analysis apply a collection of inference rules to a dismantled intermediate form of the source program, making them difficult to apply ...
Buss, Marcio   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy