Zobrazeno 1 - 9
of 9
pro vyhledávání: '"John Heaps"'
Publikováno v:
ACM Transactions on Software Engineering and Methodology. 32:1-34
Mobile apps are widely used and often process users’ sensitive data. Many taint analysis tools have been applied to analyze sensitive information flows and report data leaks in apps. These tools require a list of sources (where sensitive data is ac
Autor:
Martin S. Taylor, Connie Wu, Peter C. Fridy, Stephanie J. Zhang, Yasmeen Senussi, Justina C. Wolters, Wen-Chih Cheng, John Heaps, Bryant D. Miller, Kei Mori, Limor Cohen, Hua Jiang, Kelly R. Molloy, Brian T. Chait, Michael Goggins, Irun Bhan, Joseph W. Franses, Xiaoyu Yang, Mary-Ellen Taplin, Xinan Wang, David C. Christiani, Bruce E. Johnson, Matthew Meyerson, Ravindra Uppaluri, Ann Marie Egloff, Elyssa N. Denault, Laura M. Spring, Tian-Li Wang, Ie-Ming Shih, Euihye Jung, Kshitij S. Arora, Lawrence R. Zukerberg, Osman H. Yilmaz, Gary Chi, Bryanna L. Norden, Yuhui Song, Linda Nieman, Aparna R. Parikh, Matthew Strickland, Ryan B. Corcoran, Tomas Mustelin, George Eng, Ömer H. Yilmaz, Ursula A. Matulonis, Steven J. Skates, Bo R. Rueda, Ronny Drapkin, Samuel J. Klempner, Vikram Deshpande, David T. Ting, Michael P. Rout, John LaCava, David R. Walt, Kathleen H. Burns
Publikováno v:
bioRxiv
Improved biomarkers are needed for early cancer detection, risk stratification, treatment selection, and monitoring treatment response. While proteins can be useful blood-based biomarkers, many have limited sensitivity or specificity for these applic
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1cdcf66174cd5676ee31b3db57f28b9f
https://hdl.handle.net/11370/41ca3c33-d273-45a6-bf29-9274abc151ef
https://hdl.handle.net/11370/41ca3c33-d273-45a6-bf29-9274abc151ef
Publikováno v:
RE
Privacy policies are legal documents containing application data practices. These documents are well-established sources of requirements in software engineering. However, privacy policies are written in natural language, thus subject to ambiguity and
Publikováno v:
Data and Applications Security and Privacy XXXV ISBN: 9783030812416
DBSec
DBSec
Agile software development methodology involves developing code incrementally and iteratively from a set of evolving user stories. Since software developers use user stories to write code, these user stories are better representations of the actual c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::00abe02aa9f334488d96436f728adf5b
https://doi.org/10.1007/978-3-030-81242-3_10
https://doi.org/10.1007/978-3-030-81242-3_10
Publikováno v:
SACMAT
Advancement in machine learning techniques in recent years has led to deep learning applications on source code. While there is little research available on the subject, the work that has been done shows great potential. We believe deep learning can
Publikováno v:
HotSoS
We propose a framework to detect software bugs based on code pattern detection. Our framework will mine and generate bug patterns, detect those patterns in code, and calculate a vulnerability measure of software. While our framework performs well, we
Publikováno v:
SACMAT
Many access control patterns, both positive and negative, have been identified in the past. However, there is little research describing how to leverage those patterns for the detection of access control bugs in code. Many software bug detection mode
Publikováno v:
SACMAT
Many organizations process personal information in the course of normal operations. Improper disclosure of this information can be damaging, so organizations must obey privacy laws and regulations that impose restrictions on its release or risk penal
Autor:
Simon Jackson, John Heaps
Publikováno v:
Law and Financial Markets Review. 1:135-139
As America continues to be a key protagonist in the march of globalisation, the American ways of doing business and resolving the disputes which arise from that business, are starting to inform and...