Withthe rapid development of deep learning, deep learning-based malware detection has received increasing attention because of its advantage of not relying on domain knowledge. the research community has proposed som...
详细信息
Systematic literature reviews (SLRs) and systematic mapping studies (SMSs) are common studies in any discipline to describe and classify past works, and to inform a research field of potential new areas of investigati...
详细信息
ISBN:
(纸本)9789897586477
Systematic literature reviews (SLRs) and systematic mapping studies (SMSs) are common studies in any discipline to describe and classify past works, and to inform a research field of potential new areas of investigation. this last task is typically achieved by observing gaps in past works, and hinting at the possibility of future research in those gaps. Using an NLP-driven methodology, this paper proposes a meta-analysis to extend current systematic methodologies of literature reviews and mapping studies. Our work leverages a Word2Vec model, pre-trained in the softwareengineering domain, and is combined with a time series analysis. Our aim is to forecast future trajectories of research outlined in systematic studies, rather than just describing them. Using the same dataset from our own previous mapping study, we were able to go beyond descriptively analysing the data that we gathered, or to barely 'guess' future directions. In this paper, we show how recent advancements in the field of our SMS, and the use of time series, enabled us to forecast future trends in the same field. Our proposed methodology sets a precedent for exploring the potential of language models coupled with time series in the context of systematically reviewing the literature.
this paper investigates the predictive capabilities of Long Short-Term Memory (LSTM) models using diverse time series data relevant to lifestyle decisions and business planning, such as stock prices, exchange rates, g...
详细信息
the primary aim of this article is to investigate, contrast, and formulate a time series model to predict Bangkok9;s overall population. In this study, we intend to propose a hybrid model that combines the Autoregr...
详细信息
this paper introduces a novel edge device architecture designed to optimize solar energy management systems. It integrates cutting-edge functionalities such as generation prediction, maintenance alerts, and anomaly de...
详细信息
Image watermarking algorithms have developed rapidly in recent years. Most of the Deep Neural Network(DNN)-based image watermarking algorithms embed only 30 bits or 64 bits messages in 128 × 128 images, while few...
详细信息
the collaborative model of open-source software (OSS) development significantly enhances efficiency and fosters innovation by enabling diverse global contributors to collaborate seamlessly. Core contributors, who prov...
详细信息
Accurate motion tracking and visualization of cardiac structures in MRI images are crucial for diagnosing and treating heart diseases. this paper introduces CardioTrackNet, a novel hybrid model that integrates an Acti...
详细信息
the recent emergence of the Log4jshell vulnerability demonstrates the importance of detecting code vulnerabilities in software systems. software Vulnerability Prediction models (VPMs) are a promising tool for vulnerab...
详细信息
ISBN:
(纸本)9781450398602
the recent emergence of the Log4jshell vulnerability demonstrates the importance of detecting code vulnerabilities in software systems. software Vulnerability Prediction models (VPMs) are a promising tool for vulnerability detection. Recent studies have focused on improving the performance of models to predict whether a piece of code is vulnerable or not (binary classification). However, such approaches are limited because they do not provide developers with information on the type of vulnerability that needs to be patched. We present our multiclass classification approach to improve the performance of vulnerability prediction models. Our approach uses abstract syntax tree n-grams to identify code clusters related to specific vulnerabilities. We evaluated our approach using real-world Java software vulnerability data. We report increased predictive performance compared to a variety of other models, for example, F-measure increases from 55% to 75% and MCC increases from 48% to 74%. Our results suggest that clustering software vulnerabilities using AST n-gram information is a promising approach to improve vulnerability prediction and enable specific information about the vulnerability type to be provided.
Modern softwareengineering faces complex challenges, particularly in accurately and efficiently modeling systems from textual specifications. UML class diagrams are essential tools for representing the static structu...
详细信息
暂无评论