Zobrazeno 1 - 10
of 3 999
pro vyhledávání: '"abstract syntax"'
MVD-HG: multigranularity smart contract vulnerability detection method based on heterogeneous graphs
Publikováno v:
Cybersecurity, Vol 7, Iss 1, Pp 1-15 (2024)
Abstract Smart contracts have significant losses due to various types of vulnerabilities. However, traditional vulnerability detection methods rely extensively on expert rules, resulting in low detection accuracy and poor adaptability to novel attack
Externí odkaz:
https://doaj.org/article/b5efcd0eeddb4fe09c9afbf409f90ea0
Publikováno v:
Tạp chí Khoa học và Công nghệ, Pp 1-5 (2024)
Software fault prediction (SFP) is an important approach in software engineering that ensures software quality and reliability. Prediction of software faults helps developers identify faulty components in software systems. Several studies focus on so
Externí odkaz:
https://doaj.org/article/08bac12175734b7f9e0405ad5279701b
Autor:
Hsiang-Mei Liang, Chin-Yu Huang
Publikováno v:
IEEE Access, Vol 12, Pp 9871-9889 (2024)
Source code summaries play a crucial role in helping programmers comprehend the behavior of source code functions. In recent deep-learning based approaches for Source Code Summarization, there has been a growing focus on Transformer-based models. The
Externí odkaz:
https://doaj.org/article/c24b801ad674428cafb34d78658ad3c6
Autor:
Maxim Kalinin, Nikita Gribkov
Publikováno v:
Sensors, Vol 24, Iss 22, p 7251 (2024)
This paper addresses the problem of IoT security caused by code cloning when developing a massive variety of different smart devices. A clone detection method is proposed to identify clone-caused vulnerabilities in IoT software. A hybrid solution com
Externí odkaz:
https://doaj.org/article/32dbdbd9bfa348c7b17a0836890715b4
Publikováno v:
Frontiers in Computer Science, Vol 6 (2024)
Mechanisms for plagiarism detection play a crucial role in maintaining academic integrity, acting both to penalize wrongdoing while also serving as a preemptive deterrent for bad behavior. This manuscript proposes a customized plagiarism detection al
Externí odkaz:
https://doaj.org/article/76c1711e224940df90b954705cb62d11
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 36, Iss 2, Pp 101970- (2024)
Program analysis using deep learning has become a focus of research, and representing code as model input is a major challenge. While abstract syntax trees (ASTs) have proven effective, using them directly as model input introduces issues of long-ter
Externí odkaz:
https://doaj.org/article/4a78547e40a14cbbb17921161d73bd28
Publikováno v:
Jisuanji kexue, Vol 50, Iss 4, Pp 317-322 (2023)
With the development of blockchain technology,smart contracts have been widely used in various fields,and Ethereum has become the largest smart contract platform.At the same time,the frequent smart contract vulnerabilities have caused huge economic l
Externí odkaz:
https://doaj.org/article/4f055dff738a440a8328e82d79abc8e2
Publikováno v:
Information, Vol 15, Iss 4, p 216 (2024)
Given a set of software programs, each being labeled either as vulnerable or benign, deep learning technology can be used to automatically build a software vulnerability detector. A challenge in this context is that there are countless equivalent way
Externí odkaz:
https://doaj.org/article/cc258c7b89544f6dab2da4015daab505
Autor:
Alexandru-Gabriel SÎRBU
Publikováno v:
Studia Universitatis Babes-Bolyai: Series Informatica, Vol 68, Iss 2 (2023)
The JavaScript code deployed goes through the process of minification, in which variables are renamed using single-character names and spaces are removed in order for the files to have a smaller size, thus loading faster. Because of this, the code be
Externí odkaz:
https://doaj.org/article/799d2b86e03648deab9b737f17d4b72d