Zobrazeno 1 - 10
of 34
pro vyhledávání: '"Sauerwein, Clemens"'
This paper analyzes Large Language Models (LLMs) with regard to their programming exercise generation capabilities. Through a survey study, we defined the state of the art, extracted their strengths and weaknesses and finally proposed an evaluation m
Externí odkaz:
http://arxiv.org/abs/2405.20183
Artificial Intelligence (AI) approaches have been incorporated into modern learning environments and software engineering (SE) courses and curricula for several years. However, with the significant rise in popularity of large language models (LLMs) i
Externí odkaz:
http://arxiv.org/abs/2405.18062
Security conferences are important venues at which academics and practitioners share knowledge about new attacks and state-of-the-art defenses. Despite this, researchers have not studied who shares information and about which security topics. To addr
Externí odkaz:
http://arxiv.org/abs/2404.17989
With the rapid advancement of artificial intelligence (AI) in various domains, the education sector is set for transformation. The potential of AI-driven tools in enhancing the learning experience, especially in programming, is immense. However, the
Externí odkaz:
http://arxiv.org/abs/2404.02548
The openness of modern IT systems and their permanent change make it challenging to keep these systems secure. A combination of regression and security testing called security regression testing, which ensures that changes made to a system do not har
Externí odkaz:
http://arxiv.org/abs/2309.09647
Autor:
Sauerwein, Clemens, Antensteiner, Tobias, Oppl, Stefan, Groher, Iris, Meschtscherjakov, Alexander, Zech, Philipp, Breu, Ruth
The assessment of source code in university education is a central and important task for lecturers of programming courses. In doing so, educators are confronted with growing numbers of students having increasingly diverse prerequisites, a shortage o
Externí odkaz:
http://arxiv.org/abs/2306.04958
Autor:
Sauerwein, Clemens, Pfohl, Alexander
The increasingly sophisticated and growing number of threat actors along with the sheer speed at which cyber attacks unfold, make timely identification of attacks imperative to an organisations' security. Consequently, persons responsible for securit
Externí odkaz:
http://arxiv.org/abs/2207.08478
The digital transformation influences business models, processes, and enterprise IT landscape as a whole. Therefore, business-IT alignment is becoming more important than ever before. Enterprise architecture management (EAM) is designed to support an
Externí odkaz:
http://arxiv.org/abs/2004.05087
Publikováno v:
Computers & Security 92 (2020)
Information security management aims at ensuring proper protection of information values and information processing systems (i.e. assets). Information security risk management techniques are incorporated to deal with threats and vulnerabilities that
Externí odkaz:
http://arxiv.org/abs/2003.07674
Publikováno v:
In Computers & Security December 2021 111