Results 21 to 30 of about 685,344 (267)

A Comparative Study of Deep Learning-Based Vulnerability Detection System

open access: yesIEEE Access, 2019
Source code static analysis has been widely used to detect vulnerabilities in the development of software products. The vulnerability patterns purely based on human experts are laborious and error prone, which has motivated the use of machine learning ...
Zhen Li   +5 more
doaj   +1 more source

Academic Source Code Plagiarism Detection by Measuring Program Behavioral Similarity

open access: yesIEEE Access, 2021
Source code plagiarism is a long-standing issue in tertiary computer science education. Many source code plagiarism detection tools have been proposed to aid in the detection of source code plagiarism.
Hayden Cheers   +2 more
doaj   +1 more source

Collecting Vulnerable Source Code from Open-Source Repositories for Dataset Generation

open access: yesApplied Sciences, 2020
Different Machine Learning techniques to detect software vulnerabilities have emerged in scientific and industrial scenarios. Different actors in these scenarios aim to develop algorithms for predicting security threats without requiring human ...
Razvan Raducu   +3 more
doaj   +1 more source

The Influence of Code Retrieval from the Web on Programmer’s Skills, Meth-odologies, and Coding Behaviors

open access: yesمجلة المختار للعلوم, 2021
The development of software projects consists of several stages, such as analysis and design. It also requires a set of skills that the software developer can use to work on the project, such as specifying the requirements and writing code.
Alfaroq O.M. Mohammed   +2 more
doaj   +1 more source

Vulnerability Prediction From Source Code Using Machine Learning

open access: yesIEEE Access, 2020
As the role of information and communication technologies gradually increases in our lives, software security becomes a major issue to provide protection against malicious attempts and to avoid ending up with noncompensable damages to the system.
Zeki Bilgin   +5 more
doaj   +1 more source

Scalable Source Code Similarity Detection in Large Code Repositories [PDF]

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2019
Source code similarity are increasingly used in application development to identify clones, isolate bugs, and find copy-rights violations. Similar code fragments can be very problematic due to the fact that errors in the original code must be fixed in ...
Firas Alomari, Muhammed Harbi
doaj   +1 more source

Implementation of an Arduino controller for temporary traffic regulation in one lane with semaphores [PDF]

open access: yesИкономика и компютърни науки, 2021
The purpose of this article is to present the use of an Arduino controller for a road semaphore to regulate traffic in directions in one lane. An Arduino starter kit is used.
Julian Vasilev   +4 more
doaj  

Sequence-to-Sequence Learning-Based Conversion of Pseudo-Code to Source Code Using Neural Translation Approach

open access: yesIEEE Access, 2022
Pseudo-code refers to an informal means of representing algorithms that do not require the exact syntax of a computer programming language. Pseudo-code helps developers and researchers represent their algorithms using human-readable language.
Uzzal Kumar Acharjee   +5 more
doaj   +1 more source

Decomposing Monolithic to Microservices: Keyword Extraction and BFS Combination Method to Cluster Monolithic’s Classes

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2023
Microservices architecture is widely used because of the ease of maintaining its microservices, as opposed to encapsulating functionality in a monolithic, which may negatively impact the development process when the application continues to grow.
Siti Rochimah, Bintang Nuralamsyah
doaj   +1 more source

A Lightweight Assisted Vulnerability Discovery Method Using Deep Neural Networks

open access: yesIEEE Access, 2019
Thousands of vulnerabilities are discovered in programs every day, which is extremely harmful to software security. Thus, discovering vulnerabilities in projects has become a central issue.
Runhao Li   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy