Results 11 to 20 of about 2,796,496 (275)

Are Source Code Metrics “Good Enough” in Predicting Security Vulnerabilities?

open access: yesData, 2022
Modern systems produce and handle a large volume of sensitive enterprise data. Therefore, security vulnerabilities in the software systems must be identified and resolved early to prevent security breaches and failures.
Sundarakrishnan Ganesh   +2 more
doaj   +1 more source

Complex Cases of Source Code Authorship Identification Using a Hybrid Deep Neural Network

open access: yesFuture Internet, 2022
This paper is a continuation of our previous work on solving source code authorship identification problems. The analysis of heterogeneous source code is a relevant issue for copyright protection in commercial software development. This is related to the
Anna Kurtukova   +3 more
doaj   +1 more source

Automated Data-Processing Function Identification Using Deep Neural Network

open access: yesIEEE Access, 2020
The number of software vulnerabilities is increasing year by year. In the era of big data, data-processing software with many users is more concerned by hackers.
Hongyu Kuang   +4 more
doaj   +1 more source

Meta-Heuristic Guided Feature Optimization for Enhanced Authorship Attribution in Java Source Code

open access: yesIEEE Access, 2023
Source code authorship attribution is the task of identifying who develops the code based on learning based on the programmer style. It is one of the critical activities which used extensively in different aspects such as computer security, computer law,
Bilal Al-Ahmad   +8 more
doaj   +1 more source

Looking before Leaping: Creating a Software Registry

open access: yesJournal of Open Research Software, 2015
What lessons can be learned from examining numerous efforts to create a repository or directory of scientist-written software for a discipline? Astronomy has seen a number of efforts to build such a resource, one of which is the Astrophysics Source Code ...
Alice Allen, Judy Schmidt
doaj   +1 more source

Assessment of Source Code Obfuscation Techniques [PDF]

open access: yes, 2016
Obfuscation techniques are a general category of software protections widely adopted to prevent malicious tampering of the code by making applications more difficult to understand and thus harder to modify.
Basile, Cataldo   +6 more
core   +2 more sources

Polar codes for distributed source coding [PDF]

open access: yesElectronics Letters, 2013
A polar coding method to construct a distributed source coding scheme which can achieve any point on the dominant face of the Slepian‐Wolf rate region for sources with uniform marginals is proposed.
openaire   +6 more sources

A methodology of automatic class diagrams generation from source code using Model-Driven Architecture and Machine Learning to achieve Energy Efficiency [PDF]

open access: yesE3S Web of Conferences, 2023
The automated generation of class diagrams is a crucial task in software engineering, facilitating the understanding, analysis, and documentation of complex software systems.
Sajji Abir   +2 more
doaj   +1 more source

Iterative joint design of source codes and multiresolution channel codes [PDF]

open access: yes, 1997
We propose an iterative design algorithm for jointly optimizing source and channel codes. The joint design combines channel-optimized vector quantization (COVQ) for the source code with rate-compatible punctured convolutional (RCPC) coding for the ...
Effros, Michelle, Goldsmith, Andrea
core   +1 more source

Locating Source Code Bugs in Software Information Systems Using Information Retrieval Techniques

open access: yesBig Data and Cognitive Computing, 2022
Bug localization is the process through which the buggy source code files are located regarding a certain bug report. Bug localization is an overwhelming and time-consuming process.
Ali Alawneh   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy