In recent years, numerous Machine Learning (ML) models, including Deep Learning (DL) and classic ML models, have been developed to detect software vulnerabilities. However, there is a notable lack of comprehensive and...
详细信息
In recent years, numerous Machine Learning (ML) models, including Deep Learning (DL) and classic ML models, have been developed to detect software vulnerabilities. However, there is a notable lack of comprehensive and systematic surveys that summarize, classify, and analyze the applications of these ML models in software vulnerability detection. This absence may lead to critical research areas being overlooked or underrepresented, resulting in a skewed understanding of the current state of the art in software vulnerability detection. To close this gap, we propose a comprehensive and systematic literature review that characterizes the different properties of ML-based software vulnerability detection systems using six major Research Questions (RQs). Using a custom web scraper, our systematic approach involves extracting a set of studies from four widely used online digital libraries: ACM Digital Library, IEEE Xplore, scienceDirect, and Google Scholar. We manually analyzed the extracted studies to filter out irrelevant work unrelated to software vulnerability detection, followed by creating taxonomies and addressing RQs. Our analysis indicates a significant upward trend in applying ML techniques for software vulnerability detection over the past few years, with many studies published in recent years. Prominent conference venues include the internationalconference on softwareengineering (ICSE), the international Symposium on software Reliability engineering (ISSRE), the Mining software Repositories (MSR) conference, and the ACM internationalconference on the Foundations of softwareengineering (FSE), whereas Information and software Technology (IST), Computers & Security (C&S), and Journal of systems and software (JSS) are the leading journal venues. Our results reveal that 39.1% of the subject studies use hybrid sources, whereas 37.6% of the subject studies utilize benchmark data for software vulnerability detection. Code-based data are the most commonly used data t
Large Language Models (LLM) is a type of artificial neural network that excels at language-related tasks. The advantages and disadvantages of using LLM in softwareengineering are still being debated, but it is a tool...
详细信息
The proceedings contain 33 papers. The special focus in this conference is on Internet computing and IoT. The topics include: Malware Detection in the IoT Home Network;IoT-Based Analysis of Environmental and Motion Da...
ISBN:
(纸本)9783031859229
The proceedings contain 33 papers. The special focus in this conference is on Internet computing and IoT. The topics include: Malware Detection in the IoT Home Network;IoT-Based Analysis of Environmental and Motion Data for Comfort and Energy Conservation in Optimizing HVAC systems;improving Critical Controls Using IoT and Computer Vision;A Data-Driven Driving Under the Influence (DUI) Detection, Notification and Prevention System Using Artificial Intelligence and Internet-Of-Things (IoT);understanding User Interactions with IoT Process Models: A Demographic Perspective;Advancing IoT Process Modeling: A Comparative Evaluation of BPMNE4IoT and Traditional BPMN on User-Friendliness, Effectiveness, and Workload;Threat Detection Using MLP for IoT Network;harnessing Social Robotics and the Internet of Things to Reduce the Risk of Older Adults Developing Hypothermia and Dehydration;re/Imagining Smart Home Automation Framework in the Era of 6G-Enabled Smart Cities;smart Roadway Monitoring: Pothole Detection and Mapping via Google Street View;Energy-Efficiency Modeling for AI Applications on Edge computing;optimizing Wireless Sensor Network Node Placement Using Bacterial Foraging Optimization;The Vital Role of Small and Marginal Farmer in Future of Our Climate: Democratization of Machine Learning, Artificial Intelligence, and Dairy Cow Necklace Sensors in Achieving the UN Climate Change Goals (COP21) and the Paris Agreement;autonomous Driving Prototype with Raspberry Pi by Using Image Processing Technology;towards Implementation of Privacy-Preserving Federated Learning Aggregation Using Multi-key Homomorphic Encryption;advancing Nursing Education Through Virtual Reality Training: A Revolutionary Approach to Ensuring Patient Safety;multiDrone Simulator An Open Source Multi-plataform Tool to Use in Tests of Optimized Flight of Group of Drones;Revolutionizing Multiplayer Gaming: A Deep Dive into VisionXO, a 3D Multiplayer Tic-Tac-Toe Game.
With the growing diffusion of quantum computing technology and the increasingly promising applications derived from it, the relevance of developing specific software for these systems is gaining significant momentum. ...
详细信息
ISBN:
(纸本)9783031708060;9783031708077
With the growing diffusion of quantum computing technology and the increasingly promising applications derived from it, the relevance of developing specific software for these systems is gaining significant momentum. This surge is due to the need to design and produce quantum software that meets performance and functional requirements but also follows the well-known good practices and rigorous methodologies inherent in quantum softwareengineering. In this context, one of the main challenges facing the development of hybrid (quantum-classical) systems is the effective management of the lifecycle of this new type of software, whose nature differs from traditional systems. The proposed research attempts to comprehensively address the lifecycle management of hybrid software, through the design and development of a specific support tool. To achieve this goal, the ICSM (Integrated software Cycle Management) model, which is a consolidated framework for the lifecycle management of traditional software, will be taken as a starting point. This model will be carefully adapted to meet the unique needs and challenges inherent in hybrid software, thus ensuring that the development, maintenance, and updating practices of this type of software are as robust and efficient as those applied in the realm of conventional software. Through this adaptation, the aim is not only to improve the quality of the developed hybrid software but also make developers easier to adopt the innovative and complex quantum software paradigm.
Over the past few years, the integration of mobile edge computing (MEC) and serverless computing, known as serverless MEC (SMEC), has garnered considerable attention. Despite abundant existing works on SMEC exploratio...
详细信息
Over the past few years, the integration of mobile edge computing (MEC) and serverless computing, known as serverless MEC (SMEC), has garnered considerable attention. Despite abundant existing works on SMEC exploration, there remains an unaddressed gap in guaranteeing dependable application outputs due to ignoring the threat of both soft and bit errors on SMEC infrastructures. Furthermore, existing works fall short of accommodating the personalized requirements and approximate computation of Internet of Things (IoT) applications, thereby resulting in holistic quality-of-service (QoS) degradation of SMEC systems typically provisioned by limited edge resources. In this article, we investigate the reliability-aware personalized deployment of approximate computation IoT applications for QoS maximization in SMEC environments. To this end, we propose a hybrid methodology composed of offline and online optimization phases. At the offline phase, a decomposition-based function placement method is devised to accomplish function-to-server mapping by integrating convex optimization, cross-entropy method, and incremental control techniques. At the online phase, a lightweight reinforcement learning scheme based on proximal policy optimization (PPO) is developed to handle the inherent dynamicity of IoT applications. We also build a simulation platform upon the real-world base station distribution in Shanghai Telecom and the practical cluster trace in the Alibaba open program. Evaluations demonstrate that our hybrid approach boosts the holistic QoS by 63.9% compared with the state-of-the-art peer algorithms.
As the public pays more and more attention to fire, the importance of fire prevention is becoming increasingly prominent. This paper focuses on the realization of fire alarm software that can alarm in real time. Throu...
详细信息
software architecture plays an important role in the development of modern, complex softwaresystems as it influences a system's quality attributes and ability to grow with future demand. Designing the software ar...
详细信息
ISBN:
(纸本)9783031790584;9783031790591
software architecture plays an important role in the development of modern, complex softwaresystems as it influences a system's quality attributes and ability to grow with future demand. Designing the software architecture of cyber-physical systems (CPS) becomes even more challenging due to their capability of directly influencing the physical world and thus introducing new non-functional requirements related to fault-tolerance, safety, and resource scarcity. Existing research focuses on systemsengineering to achieve the vertical integration of CPS with an organization's information systems and processes, but not on software architecture to horizontally extend existing systems with new CPS. In this report we describe the process of revising an existing monolithic software architecture for a smart factory towards a microservices-based architecture to meet these new requirements and prepare the factory to be extended with new CPS. For the revision of the existing architecture, we provide an analysis of its code base before and after changes, a description of the refactoring process, and discuss relevant new non-functional requirements and architecture options. We elaborate on the architectural decisions favoring microservices and analyze the new architecture regarding improved quality attributes to evaluate the system.
In order to increase automation, strengthen decision- making, and improve efficiency while reducing costs and maintaining precision, the development of intelligent machinery is becoming more and more dependent on the ...
详细信息
UGVs have enormous potential in industries such as defense, agriculture, and autonomous transportation. Efficiency and effectiveness can be achieved by UGVs through the sophistication of their control systems, mainly ...
详细信息
暂无评论