Results 1 to 10 of about 685,344 (267)

Source code analysis dataset [PDF]

open access: yesData in Brief, 2019
The data in this article pair source code with three artifacts from 108,568 projects downloaded from Github that have a redistributable license and at least 10 stars.
Ben Gelman   +3 more
doaj   +2 more sources

Evaluating the Usability and Functionality of Intelligent Source Code Completion Assistants: A Comprehensive Review

open access: yesApplied Sciences, 2023
As artificial intelligence advances, source code completion assistants are becoming more advanced and powerful. Existing traditional assistants are no longer up to all the developers’ challenges.
Tilen Hliš   +3 more
doaj   +1 more source

Authorship Identification of Binary and Disassembled Codes Using NLP Methods

open access: yesInformation, 2023
This article is part of a series aimed at determining the authorship of source codes. Analyzing binary code is a crucial aspect of cybersecurity, software development, and computer forensics, particularly in identifying malware authors.
Aleksandr Romanov   +3 more
doaj   +1 more source

Intellectual property rights in the era of Italian “artificial” public decisions: time to collapse?

open access: yesRivista Italiana di Informatica e Diritto, 2023
Considering that the Public Administration may not be able to internally develop the technologies necessary for its digital transformation process, having to procure them on the private market, the exclusivity of copy-right could affirm an unprecedented ...
Massimo Farina
doaj   +1 more source

Automated Source Code Generation and Auto-Completion Using Deep Learning: Comparing and Discussing Current Language Model-Related Approaches

open access: yesAI, 2021
In recent years, the use of deep learning in language models has gained much attention. Some research projects claim that they can generate text that can be interpreted as human writing, enabling new possibilities in many application areas.
Juan Cruz-Benito   +3 more
doaj   +1 more source

BIOPLAG: An Approach to Detect Programming Plagiarism

open access: yesAnais da Academia Brasileira de Ciências, 2023
This paper creates an approach to the automatic detection of plagiarism in programming by combining the interdisciplinary knowledge from bioinformatics with techniques such as: tokens of programming language elements, tokens mapping in synthetic ...
KAIO P. GOMES   +2 more
doaj   +1 more source

C Source code Obfuscation using Hash Function and Encryption Algorithm

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2023
Obfuscation is a technique for transforming program code into a different form that is more difficult to understand. Several obfuscation methods are used to obfuscate source code, including dead code insertion, code transposition, and string encryption ...
Sarah Rosdiana Tambunan, Nur Rokhman
doaj   +1 more source

Are Source Code Metrics “Good Enough” in Predicting Security Vulnerabilities?

open access: yesData, 2022
Modern systems produce and handle a large volume of sensitive enterprise data. Therefore, security vulnerabilities in the software systems must be identified and resolved early to prevent security breaches and failures.
Sundarakrishnan Ganesh   +2 more
doaj   +1 more source

Complex Cases of Source Code Authorship Identification Using a Hybrid Deep Neural Network

open access: yesFuture Internet, 2022
This paper is a continuation of our previous work on solving source code authorship identification problems. The analysis of heterogeneous source code is a relevant issue for copyright protection in commercial software development. This is related to the
Anna Kurtukova   +3 more
doaj   +1 more source

Meta-Heuristic Guided Feature Optimization for Enhanced Authorship Attribution in Java Source Code

open access: yesIEEE Access, 2023
Source code authorship attribution is the task of identifying who develops the code based on learning based on the programmer style. It is one of the critical activities which used extensively in different aspects such as computer security, computer law,
Bilal Al-Ahmad   +8 more
doaj   +1 more source

Home - About - Disclaimer - Privacy