Zobrazeno 1 - 10
of 1 985
pro vyhledávání: '"abstract syntax tree"'
Publikováno v:
Tạp chí Khoa học và Công nghệ, Pp 1-5 (2024)
Software fault prediction (SFP) is an important approach in software engineering that ensures software quality and reliability. Prediction of software faults helps developers identify faulty components in software systems. Several studies focus on so
Externí odkaz:
https://doaj.org/article/08bac12175734b7f9e0405ad5279701b
Autor:
Hsiang-Mei Liang, Chin-Yu Huang
Publikováno v:
IEEE Access, Vol 12, Pp 9871-9889 (2024)
Source code summaries play a crucial role in helping programmers comprehend the behavior of source code functions. In recent deep-learning based approaches for Source Code Summarization, there has been a growing focus on Transformer-based models. The
Externí odkaz:
https://doaj.org/article/c24b801ad674428cafb34d78658ad3c6
Autor:
Maxim Kalinin, Nikita Gribkov
Publikováno v:
Sensors, Vol 24, Iss 22, p 7251 (2024)
This paper addresses the problem of IoT security caused by code cloning when developing a massive variety of different smart devices. A clone detection method is proposed to identify clone-caused vulnerabilities in IoT software. A hybrid solution com
Externí odkaz:
https://doaj.org/article/32dbdbd9bfa348c7b17a0836890715b4
Autor:
Alexandru-Gabriel SÎRBU
Publikováno v:
Studia Universitatis Babes-Bolyai: Series Informatica, Vol 68, Iss 2 (2023)
The JavaScript code deployed goes through the process of minification, in which variables are renamed using single-character names and spaces are removed in order for the files to have a smaller size, thus loading faster. Because of this, the code be
Externí odkaz:
https://doaj.org/article/799d2b86e03648deab9b737f17d4b72d
Publikováno v:
Jisuanji kexue, Vol 50, Iss 4, Pp 317-322 (2023)
With the development of blockchain technology,smart contracts have been widely used in various fields,and Ethereum has become the largest smart contract platform.At the same time,the frequent smart contract vulnerabilities have caused huge economic l
Externí odkaz:
https://doaj.org/article/4f055dff738a440a8328e82d79abc8e2
Autor:
Muhammad Fakhrur Rozi, Tao Ban, Seiichi Ozawa, Akira Yamada, Takeshi Takahashi, Sangwook Kim, Daisuke Inoue
Publikováno v:
IEEE Access, Vol 11, Pp 102727-102745 (2023)
Malicious JavaScript code in web applications poses a significant threat as cyber attackers exploit it to perform various malicious activities. Detecting these malicious scripts is challenging, given their diverse nature and the continuous evolution
Externí odkaz:
https://doaj.org/article/96b921f1abd0426fa01fe22f24802029
Publikováno v:
IEEE Access, Vol 11, Pp 51155-51165 (2023)
Code summarization is the process of automatically generating brief and informative summaries of source code to aid in software comprehension and maintenance. In this paper, we propose a novel model called READSUM, REtrieval-augmented ADaptive transf
Externí odkaz:
https://doaj.org/article/7f554ebaf5e543ffb55f3b30c0e173d5
Publikováno v:
Symmetry, Vol 15, Iss 12, p 2197 (2023)
Automatic Exploit Generation (AEG) involves automatically discovering paths in a program that trigger vulnerabilities, thereby generating exploits. While there is considerable research on heap-related vulnerability detection, such as detecting Heap O
Externí odkaz:
https://doaj.org/article/db5b83a83db944358493423781934997
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.