咨询与建议

限定检索结果

文献类型

  • 125 篇 会议
  • 83 篇 期刊文献
  • 6 篇 学位论文

馆藏范围

  • 214 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 202 篇 工学
    • 145 篇 计算机科学与技术...
    • 138 篇 软件工程
    • 45 篇 电气工程
    • 7 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 电子科学与技术(可...
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 核科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 网络空间安全
  • 6 篇 教育学
    • 6 篇 教育学
  • 4 篇 管理学
    • 4 篇 管理科学与工程(可...
  • 3 篇 法学
    • 2 篇 社会学
    • 1 篇 法学
  • 2 篇 理学
    • 2 篇 数学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 1 篇 历史学
    • 1 篇 考古学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 艺术学
    • 1 篇 艺术学理论

主题

  • 214 篇 source code anal...
  • 15 篇 software mainten...
  • 13 篇 static analysis
  • 13 篇 reverse engineer...
  • 11 篇 program comprehe...
  • 9 篇 machine learning
  • 8 篇 deep learning
  • 8 篇 software quality
  • 7 篇 software evoluti...
  • 7 篇 data mining
  • 7 篇 software securit...
  • 6 篇 mining software ...
  • 6 篇 java
  • 6 篇 codes
  • 6 篇 software metrics
  • 5 篇 tracing
  • 5 篇 clone detection
  • 4 篇 software visuali...
  • 4 篇 clustering
  • 4 篇 technical debt

机构

  • 3 篇 osaka univ grad ...
  • 3 篇 queens univ sch ...
  • 3 篇 concordia univ d...
  • 3 篇 concordia univ d...
  • 2 篇 tokyo inst techn...
  • 2 篇 ctr wiskunde & i...
  • 2 篇 natl univ irelan...
  • 2 篇 luxembourg inst ...
  • 2 篇 univ milano bico...
  • 2 篇 blekinge inst te...
  • 2 篇 loyola coll dept...
  • 2 篇 univ sannio dept...
  • 2 篇 abb corp res ban...
  • 2 篇 comsats inst inf...
  • 2 篇 kyushu univ fuku...
  • 2 篇 osaka univ grad ...
  • 2 篇 natl cent univ d...
  • 2 篇 software compete...
  • 2 篇 vrije univ amste...
  • 2 篇 univ szeged dept...

作者

  • 10 篇 higo yoshiki
  • 8 篇 kusumoto shinji
  • 5 篇 di penta m
  • 5 篇 sureka ashish
  • 4 篇 merlo e
  • 4 篇 rilling juergen
  • 4 篇 antoniol g
  • 4 篇 hu qiang
  • 4 篇 rasool ghulam
  • 4 篇 lal sangeeta
  • 3 篇 monperrus martin
  • 3 篇 keivanloo iman
  • 3 篇 beszedes arpad
  • 3 篇 bernardi mario l...
  • 3 篇 li heng
  • 3 篇 jasz judit
  • 3 篇 ferretti claudio
  • 3 篇 cordy james r.
  • 3 篇 zhang zhenya
  • 3 篇 gyimothy tibor

语言

  • 209 篇 英文
  • 5 篇 其他
检索条件"主题词=Source Code Analysis"
214 条 记 录,以下是61-70 订阅
排序:
Understanding security vulnerabilities in student code: A case study in a non-security course
收藏 引用
JOURNAL OF SYSTEMS AND SOFTWARE 2022年 185卷 111150-111150页
作者: Yilmaz, Tolga Ulusoy, Ozgur Bilkent Univ Dept Comp Engn TR-06800 Ankara Turkey
Secure coding education is quite important for students to acquire the skills to quickly adapt to the evolving threats towards the software they are expected to create once they graduate. Educators are also more aware... 详细信息
来源: 评论
Unsupervised Detection of Solving Strategies for Competitive Programming  22nd
Unsupervised Detection of Solving Strategies for Competitive...
收藏 引用
22nd International Conference on Intelligent Data Engineering and Automated Learning
作者: Stoica, Alexandru Stefan Balbiceanu, Daniel Mihaescu, Marian Cristian Rebedea, Traian Univ Craiova Craiova Romania Univ Politehn Bucuresti Bucharest Romania
Transformers are becoming more and more used for solving various Natural Language Processing tasks. Recently, they have also been employed to process source code to analyze very large code-bases automatically. This pa... 详细信息
来源: 评论
How Do Programmers Express High-Level Concepts using Primitive Data Types?  28
How Do Programmers Express High-Level Concepts using Primiti...
收藏 引用
28th Asia-Pacific Software Engineering Conference (APSEC)
作者: Shinyama, Yusuke Arahori, Yoshitaka Gondow, Katsuhiko Tokyo Inst Technol Dept Name Org Meguro Ku Tokyo Japan
We investigated how programmers express high-level concepts such as path names and coordinates using primitive data types. While relying too much on primitive data types is sometimes criticized as a bad smell, it is s... 详细信息
来源: 评论
Improving Semantic Consistency of Variable Names with Use-Flow Graph analysis  28
Improving Semantic Consistency of Variable Names with Use-Fl...
收藏 引用
28th Asia-Pacific Software Engineering Conference (APSEC)
作者: Shinyama, Yusuke Arahori, Yoshitaka Gondow, Katsuhiko Tokyo Inst Technol Dept Name Org Meguro Ku Tokyo Japan
Consistency is one of the keys to maintainable source code and hence a successful software project. We propose a novel method of extracting the intent of programmers from source code of a large project (similar to 300... 详细信息
来源: 评论
An Empirical Study on the Usage and Evolution of Identifier Styles in Practice  28
An Empirical Study on the Usage and Evolution of Identifier ...
收藏 引用
28th Asia-Pacific Software Engineering Conference (APSEC)
作者: Zhang, Jingxuan Zou, Weiqin Huang, Zhiqiu Nanjing Univ Aeronaut & Astronaut Coll Comp Sci & Technol Nanjing Peoples R China
Identifiers play an important role in helping developers comprehend and maintain source code. In practice, developers usually employ two widely-used identifier styles, i.e., snake case and camel case, to format identi... 详细信息
来源: 评论
A Novel Detection Method for the Security Vulnerability of Time-of-Check to Time-of-Use
收藏 引用
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 2022年 第6期38卷 1171-1188页
作者: Zhuang, YungYu Tseng, Yao-Nang Natl Cent Univ Dept Comp Sci & Informat Engn Taoyuan 32001 Taiwan
Since Artificial Intelligence (AI) is applied to various applications for intelligent and automatic processing, ensuring systems security is even important. Many developers still prefer C-like languages for flexibilit... 详细信息
来源: 评论
Java decompiler diversity and its application to meta-decompilation
收藏 引用
JOURNAL OF SYSTEMS AND SOFTWARE 2020年 168卷 110645-110645页
作者: Harrand, Nicolas Soto-Valero, Cesar Monperrus, Martin Baudry, Benoit KTH Royal Inst Technol SE-10044 Stockholm Sweden
During compilation from Java source code to bytecode, some information is irreversibly lost. In other words, compilation and decompilation of Java code is not symmetric. Consequently, decompilation, which aims at prod... 详细信息
来源: 评论
Decompiled APK based malicious code classification
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2020年 110卷 135-147页
作者: Mateless, Roni Rejabek, Daniel Margalit, Oded Moskovitch, Robert Ben Gurion Univ Negev Beer Sheva Israel IBM Corp Cyber Secur Ctr Excellence Petah Tiqwa Israel
Due to the increasing growth in the variety of Android malware, it is important to distinguish between the unique types of each. In this paper, we introduce the use of a decompiled source code for malicious code class... 详细信息
来源: 评论
ConFuzz-A Concurrency Fuzzer  1st
ConFuzz-A Concurrency Fuzzer
收藏 引用
1st International Conference on Sustainable Technologies for Computational Intelligence (ICTSCI)
作者: Vinesh, Nischai Sethumadhavan, M. Amrita Vishwa Vidyapeetham Amrita Sch Engn TIFAC CORE Cyber Secur Coimbatore Tamil Nadu India
Concurrency bugs are as equally vulnerable as the bugs found in the single-threaded programs and these bugs can be exploited using concurrency attacks. Unfortunately, there is not much literature available in detectin... 详细信息
来源: 评论
Querying Big source code  8
Querying Big Source Code
收藏 引用
8th IEEE International Conference on Big Data (Big Data)
作者: Garcia-Alvarado, Carlos Ordonez, Carlos Autonomic LLC Palo Alto CA 94304 USA Univ Houston Dept Comp Sci Houston TX 77204 USA
Software compliance, auditing, and maintainability of large application repositories force organizations to rely on source code analysis tools to identify code vulnerabilities, data flows, technical debt, and bugs. We... 详细信息
来源: 评论