Are Source Code Metrics “Good Enough” in Predicting Security Vulnerabilities?
Modern systems produce and handle a large volume of sensitive enterprise data. Therefore, security vulnerabilities in the software systems must be identified and resolved early to prevent security breaches and failures.
Sundarakrishnan Ganesh +2 more
doaj +1 more source
Complex Cases of Source Code Authorship Identification Using a Hybrid Deep Neural Network
This paper is a continuation of our previous work on solving source code authorship identification problems. The analysis of heterogeneous source code is a relevant issue for copyright protection in commercial software development. This is related to the
Anna Kurtukova +3 more
doaj +1 more source
Automated Data-Processing Function Identification Using Deep Neural Network
The number of software vulnerabilities is increasing year by year. In the era of big data, data-processing software with many users is more concerned by hackers.
Hongyu Kuang +4 more
doaj +1 more source
Meta-Heuristic Guided Feature Optimization for Enhanced Authorship Attribution in Java Source Code
Source code authorship attribution is the task of identifying who develops the code based on learning based on the programmer style. It is one of the critical activities which used extensively in different aspects such as computer security, computer law,
Bilal Al-Ahmad +8 more
doaj +1 more source
Looking before Leaping: Creating a Software Registry
What lessons can be learned from examining numerous efforts to create a repository or directory of scientist-written software for a discipline? Astronomy has seen a number of efforts to build such a resource, one of which is the Astrophysics Source Code ...
Alice Allen, Judy Schmidt
doaj +1 more source
Assessment of Source Code Obfuscation Techniques [PDF]
Obfuscation techniques are a general category of software protections widely adopted to prevent malicious tampering of the code by making applications more difficult to understand and thus harder to modify.
Basile, Cataldo +6 more
core +2 more sources
Polar codes for distributed source coding [PDF]
A polar coding method to construct a distributed source coding scheme which can achieve any point on the dominant face of the Slepian‐Wolf rate region for sources with uniform marginals is proposed.
openaire +6 more sources
A methodology of automatic class diagrams generation from source code using Model-Driven Architecture and Machine Learning to achieve Energy Efficiency [PDF]
The automated generation of class diagrams is a crucial task in software engineering, facilitating the understanding, analysis, and documentation of complex software systems.
Sajji Abir +2 more
doaj +1 more source
Iterative joint design of source codes and multiresolution channel codes [PDF]
We propose an iterative design algorithm for jointly optimizing source and channel codes. The joint design combines channel-optimized vector quantization (COVQ) for the source code with rate-compatible punctured convolutional (RCPC) coding for the ...
Effros, Michelle, Goldsmith, Andrea
core +1 more source
Locating Source Code Bugs in Software Information Systems Using Information Retrieval Techniques
Bug localization is the process through which the buggy source code files are located regarding a certain bug report. Bug localization is an overwhelming and time-consuming process.
Ali Alawneh +2 more
doaj +1 more source

