咨询与建议

限定检索结果

文献类型

  • 121 篇 会议
  • 63 篇 期刊文献
  • 5 篇 学位论文

馆藏范围

  • 189 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 173 篇 工学
    • 124 篇 计算机科学与技术...
    • 96 篇 软件工程
    • 50 篇 电气工程
    • 20 篇 信息与通信工程
    • 8 篇 控制科学与工程
    • 4 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 交通运输工程
    • 2 篇 建筑学
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 土木工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 城乡规划学
  • 11 篇 管理学
    • 11 篇 管理科学与工程(可...
    • 1 篇 工商管理
  • 8 篇 理学
    • 4 篇 数学
    • 2 篇 系统科学
    • 1 篇 物理学
    • 1 篇 天文学
    • 1 篇 地理学
    • 1 篇 科学技术史(分学科...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 189 篇 static code anal...
  • 18 篇 security
  • 14 篇 machine learning
  • 12 篇 codes
  • 11 篇 software quality
  • 10 篇 vulnerabilities
  • 10 篇 software metrics
  • 9 篇 vulnerability de...
  • 6 篇 natural language...
  • 6 篇 software securit...
  • 5 篇 reliability
  • 5 篇 deep learning
  • 5 篇 program analysis
  • 5 篇 dynamic code ana...
  • 4 篇 compilers
  • 4 篇 software enginee...
  • 4 篇 java
  • 4 篇 optimization
  • 4 篇 static analysis
  • 4 篇 metrics

机构

  • 4 篇 mta szte res grp...
  • 4 篇 univ szeged dept...
  • 3 篇 univ calif river...
  • 3 篇 stottler henke a...
  • 3 篇 johannes kepler ...
  • 3 篇 univ goettingen ...
  • 3 篇 tech univ munich...
  • 2 篇 lebanese amer un...
  • 2 篇 johannes kepler ...
  • 2 篇 acronis scs scot...
  • 2 篇 univ missouri co...
  • 2 篇 ozyegin univ ist...
  • 2 篇 univ baltimore s...
  • 2 篇 software compete...
  • 2 篇 air force res la...
  • 2 篇 univ missouri sc...
  • 2 篇 assiut universit...
  • 2 篇 kth royal inst t...
  • 2 篇 univ passau pass...
  • 2 篇 vestel elect man...

作者

  • 6 篇 ferenc rudolf
  • 4 篇 linsbauer lukas
  • 4 篇 gyimothy tibor
  • 4 篇 trautsch alexand...
  • 4 篇 toth zoltan
  • 4 篇 vieira marco
  • 3 篇 herbold steffen
  • 3 篇 kumar vijay
  • 3 篇 langweg hanno
  • 3 篇 hegedus peter
  • 3 篇 schuckert felix
  • 3 篇 luo yu
  • 3 篇 ladanyi gergely
  • 3 篇 grabowski jens
  • 3 篇 ludwig jeremy
  • 3 篇 sozer hasan
  • 3 篇 pereira jose d'a...
  • 3 篇 praehofer herber...
  • 3 篇 xu dianxiang
  • 3 篇 xu weifeng

语言

  • 187 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"主题词=Static Code Analysis"
189 条 记 录,以下是171-180 订阅
排序:
FAGnet: Family-aware-based android malware analysis using graph neural network
收藏 引用
KNOWLEDGE-BASED SYSTEMS 2024年 289卷
作者: Wang, Zhendong Zeng, Kaifa Wang, Junling Li, Dahai Jiangxi Univ Sci & Technol Sch Informat Engn Ganzhou 341000 Jiangxi Peoples R China
Android malware family analysis is essential for building an efficient malware detection mechanism. In recent years, many graph representation learning -based malware detection and classification studies have been pro... 详细信息
来源: 评论
A Large-scale analysis of How OpenSSL Is Used in Open-source Software
A Large-scale Analysis of How OpenSSL Is Used in Open-source...
收藏 引用
作者: Heidbrink, Scott Jared Brigham Young University
学位级别:M.Sc.
As vulnerabilities become more common the security of applications are coming under increased scrutiny. In regards to Internet security, recent work discovers that many vulnerabilities are caused by TLS library misuse... 详细信息
来源: 评论
Defect prediction using deep learning with Network Portrait Divergence for software evolution
收藏 引用
EMPIRICAL SOFTWARE ENGINEERING 2022年 第5期27卷 118-118页
作者: Walunj, Vijay Gharibi, Gharib Alanazi, Rakan Lee, Yugyung Univ Missouri Sch Comp & Engn Kansas City MO 64110 USA Northern Border Univ Fac Comp & Informat Technol Rafha Saudi Arabia
Understanding software evolution is essential for software development tasks, including debugging, maintenance, and testing. As a software system evolves, it grows in size and becomes more complex, hindering its compr... 详细信息
来源: 评论
Guiding feature model evolution by lifting code-level dependencies
收藏 引用
JOURNAL OF COMPUTER LANGUAGES 2021年 63卷
作者: Feichtinger, Kevin Hinterreiter, Daniel Linsbauer, Lukas Praehofer, Herbert Gruenbacher, Paul Johannes Kepler Univ Linz LIT CPS Lab Linz Austria Johannes Kepler Univ Linz Inst Software Syst Engn CDL MEVSS Linz Austria TU Braunschweig Inst Software Engn & Automot Informat Braunschweig Germany Johannes Univ Linz Inst Syst Software Linz Austria
Feature models are a de facto standard for representing the commonalities and variability of product lines and configurable software systems. Requirements-level features are commonly implemented in multiple source cod... 详细信息
来源: 评论
Estimating the potential of program repair search spaces with commit analysis
收藏 引用
JOURNAL OF SYSTEMS AND SOFTWARE 2022年 188卷 111263-111263页
作者: Etemadi, Khashayar Tarighat, Niloofar Yadav, Siddharth Martinez, Matias Monperrus, Martin KTH Royal Inst Technol Stockholm Sweden Sharif Univ Technol Tehran Iran Indraprastha Inst Informat Technol Delhi Delhi India Univ Polytech Hauts De France Valenciennes France
The most natural method for evaluating program repair systems is to run them on bug datasets, such as Defects4J. Yet, using this evaluation technique on arbitrary real-world programs requires heavy configuration. In t... 详细信息
来源: 评论
Real-Time Operating Systems' Compliance With MISRA-C Coding Standard: A Comprehensive Study
收藏 引用
IEEE ACCESS 2024年 12卷 151955-151974页
作者: Song, Jia Shigdel, Ronisha Pokharel, Aditi Alves-Foss, Jim Univ Idaho Ctr Secure & Dependable Syst CSDS Moscow ID 83844 USA
Ensuring the security and safety of a real-time operating system (RTOS) is crucial for protecting against potential cyber-attacks. A robust system can provide reliable and uninterrupted operations in the system as wel... 详细信息
来源: 评论
Reducing the fault vulnerability of hard real-time systems
收藏 引用
JOURNAL OF SYSTEMS ARCHITECTURE 2022年 133卷
作者: Bouquillon, Fabien Niar, Smail Lipari, Giuseppe Univ Lille CNRS Inria Cent LilleUMR 9189 CRIStAL F-59000 Lille France Univ Polytech Hauts De France CNRS UMR 8201 LAMIH F-59313 Valenciennes France Univ Modena & Reggio Emilia Modena Italy
With the progress of the technology, the presence of transient faults (e.g. bit-flipping errors) in cache memories becomes a challenge, especially in embedded real-time systems. These are mission critical systems that... 详细信息
来源: 评论
Insecurity Refactoring: Automated Injection of Vulnerabilities in Source code
收藏 引用
COMPUTERS & SECURITY 2023年 128卷
作者: Schuckert, Felix Katt, Basel Langweg, Hanno Norwegian Univ Sci & Technol NTNU Fac Informat Technol & Elect Engn Dept Informat Secur & Commun Technol Gjevik Norway HTWG Konstanz Univ Appl Sci Dept Comp Sci Constance Germany
Insecurity Refactoring is a change to the internal structure of software to inject a vulnerability without changing the observable behavior in a normal use case scenario. An implementation of Insecurity Refac-toring i... 详细信息
来源: 评论
Are automated static analysis tools worth it? An investigation into relative warning density and external software quality on the example of Apache open source projects
收藏 引用
EMPIRICAL SOFTWARE ENGINEERING 2023年 第3期28卷 66-66页
作者: Trautsch, Alexander Herbold, Steffen Grabowski, Jens Univ Passau Passau Germany Univ Gottingen Inst Comp Sci Gottingen Germany
Automated static analysis Tools (ASATs) are part of software development best practices. ASATs are able to warn developers about potential problems in the code. On the one hand, ASATs are based on best practices so th... 详细信息
来源: 评论
An Evaluation of Coding Violation Focusing on Change History and Authorship of Source File
收藏 引用
INTERNATIONAL JOURNAL OF NETWORKED AND DISTRIBUTED COMPUTING 2017年 第4期5卷 211-220页
作者: Burhandenny, Aji Ery Aman, Hirohisa Kawahara, Minoru Ehime Univ Grad Sch Sci & Engn 3 Bunkyo Cho Matsuyama Ehime 7908577 Japan Mulawarman Univ Fac Engn Samarinda 75119 East Kalimantan Indonesia Ehime Univ Ctr Informat Technol 3 Bunkyo Cho Matsuyama Ehime 7908577 Japan
This paper focuses on an evaluation of coding violation warned by a static code analysis tool while considering the change history of violation and the authorship of source file. Through an empirical study with data c... 详细信息
来源: 评论