Results 21 to 30 of about 685,344 (267)
A Comparative Study of Deep Learning-Based Vulnerability Detection System
Source code static analysis has been widely used to detect vulnerabilities in the development of software products. The vulnerability patterns purely based on human experts are laborious and error prone, which has motivated the use of machine learning ...
Zhen Li +5 more
doaj +1 more source
Academic Source Code Plagiarism Detection by Measuring Program Behavioral Similarity
Source code plagiarism is a long-standing issue in tertiary computer science education. Many source code plagiarism detection tools have been proposed to aid in the detection of source code plagiarism.
Hayden Cheers +2 more
doaj +1 more source
Collecting Vulnerable Source Code from Open-Source Repositories for Dataset Generation
Different Machine Learning techniques to detect software vulnerabilities have emerged in scientific and industrial scenarios. Different actors in these scenarios aim to develop algorithms for predicting security threats without requiring human ...
Razvan Raducu +3 more
doaj +1 more source
The development of software projects consists of several stages, such as analysis and design. It also requires a set of skills that the software developer can use to work on the project, such as specifying the requirements and writing code.
Alfaroq O.M. Mohammed +2 more
doaj +1 more source
Vulnerability Prediction From Source Code Using Machine Learning
As the role of information and communication technologies gradually increases in our lives, software security becomes a major issue to provide protection against malicious attempts and to avoid ending up with noncompensable damages to the system.
Zeki Bilgin +5 more
doaj +1 more source
Scalable Source Code Similarity Detection in Large Code Repositories [PDF]
Source code similarity are increasingly used in application development to identify clones, isolate bugs, and find copy-rights violations. Similar code fragments can be very problematic due to the fact that errors in the original code must be fixed in ...
Firas Alomari, Muhammed Harbi
doaj +1 more source
Implementation of an Arduino controller for temporary traffic regulation in one lane with semaphores [PDF]
The purpose of this article is to present the use of an Arduino controller for a road semaphore to regulate traffic in directions in one lane. An Arduino starter kit is used.
Julian Vasilev +4 more
doaj
Pseudo-code refers to an informal means of representing algorithms that do not require the exact syntax of a computer programming language. Pseudo-code helps developers and researchers represent their algorithms using human-readable language.
Uzzal Kumar Acharjee +5 more
doaj +1 more source
Microservices architecture is widely used because of the ease of maintaining its microservices, as opposed to encapsulating functionality in a monolithic, which may negatively impact the development process when the application continues to grow.
Siti Rochimah, Bintang Nuralamsyah
doaj +1 more source
A Lightweight Assisted Vulnerability Discovery Method Using Deep Neural Networks
Thousands of vulnerabilities are discovered in programs every day, which is extremely harmful to software security. Thus, discovering vulnerabilities in projects has become a central issue.
Runhao Li +3 more
doaj +1 more source

