咨询与建议

限定检索结果

文献类型

  • 4 篇 会议
  • 3 篇 期刊文献

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 5 篇 计算机科学与技术...
    • 3 篇 软件工程
    • 2 篇 控制科学与工程
    • 1 篇 电气工程
  • 1 篇 理学
    • 1 篇 科学技术史(分学科...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 7 篇 software source ...
  • 1 篇 graph neural net...
  • 1 篇 reproducibility
  • 1 篇 software code au...
  • 1 篇 neural nets
  • 1 篇 software enginee...
  • 1 篇 secrete sharing ...
  • 1 篇 security of data
  • 1 篇 computer program...
  • 1 篇 defects
  • 1 篇 safety container
  • 1 篇 vulnerability de...
  • 1 篇 management frame...
  • 1 篇 information soci...
  • 1 篇 archival
  • 1 篇 auditing
  • 1 篇 deep learning-ba...
  • 1 篇 cryptex model
  • 1 篇 vulnerability an...
  • 1 篇 olfactory gene

机构

  • 1 篇 acad mil sci ins...
  • 1 篇 inria software h...
  • 1 篇 chosun univ dept...
  • 1 篇 honam univ dept ...
  • 1 篇 northwestern pol...
  • 1 篇 honam univ dept ...
  • 1 篇 northwestern pol...
  • 1 篇 harbin engn univ...
  • 1 篇 chonnam natl uni...
  • 1 篇 guangdong lab ar...
  • 1 篇 univ paris
  • 1 篇 honam univ dept ...
  • 1 篇 north china elec...

作者

  • 2 篇 cha byungrae
  • 1 篇 zheng wei
  • 1 篇 kim hagang
  • 1 篇 he hongbin
  • 1 篇 yang feng
  • 1 篇 kim youngil
  • 1 篇 wang huiqiang
  • 1 篇 meng lianxiao
  • 1 篇 semasaba abubaka...
  • 1 篇 kuang hongyu
  • 1 篇 yang lin
  • 1 篇 tang gaigai
  • 1 篇 wei chen
  • 1 篇 min li
  • 1 篇 bin dong
  • 1 篇 zhang long
  • 1 篇 oh sukhee
  • 1 篇 john quackenbush
  • 1 篇 kim yongil
  • 1 篇 di cosmo roberto

语言

  • 7 篇 英文
检索条件"主题词=software source code"
7 条 记 录,以下是1-10 订阅
排序:
The Vulnerability Testing Method and Management for software source code  6
The Vulnerability Testing Method and Management for Software...
收藏 引用
6th IEEE Advanced Information Technology, Electronic and Automation Control Conference (IEEE IAEAC)
作者: Min, Li Sen, Jing Bin, Dong Wei, Chen North China Elect Power Res Inst Co Ltd Beijing Peoples R China
source code security is the foundation of software security, so it is of great significance to test source code defects before the software system goes online. This paper first elaborated the causes of source code sec... 详细信息
来源: 评论
Archiving and Referencing source code with software Heritage  1
收藏 引用
7th International Congress on Mathematical software
作者: Di Cosmo, Roberto INRIA Software Heritage Paris France Univ Paris Paris France
software, and software source code in particular, is widely used in modern research. It must be properly archived, referenced, described and cited in order to build a stable and long lasting corpus of scientific knowl... 详细信息
来源: 评论
An attention-based automatic vulnerability detection approach with GGNN
收藏 引用
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS 2023年 第9期14卷 3113-3127页
作者: Tang, Gaigai Yang, Lin Zhang, Long Cao, Weipeng Meng, Lianxiao He, Hongbin Kuang, Hongyu Yang, Feng Wang, Huiqiang Harbin Engn Univ Sch Comp Sci & Technol Harbin 150000 Heilongjiang Peoples R China Acad Mil Sci Inst Syst Engn Natl Key Lab Sci & Technol Informat Syst Secur Beijing 100071 Peoples R China Guangdong Lab Artificial Intelligence & Digital Ec Shenzhen 518107 Guangdong Peoples R China
Vulnerability detection has long been an important issue in software security. The existing methods mainly define the rules and features of vulnerabilities through experts, which are time-consuming and laborious, and ... 详细信息
来源: 评论
Literature survey of deep learning-based vulnerability analysis on source code
收藏 引用
IET software 2020年 第6期14卷 654-664页
作者: Semasaba, Abubakar Omari Abdallah Zheng, Wei Wu, Xiaoxue Agyemang, Samuel Akwasi Northwestern Polytech Univ Sch Software Xian Shaanxi Peoples R China Northwestern Polytech Univ Sch Cyberspace Secur Xian Shaanxi Peoples R China
Vulnerabilities in software source code are one of the critical issues in the realm of software code auditing. Due to their high impact, several approaches have been studied in the past few years to mitigate the damag... 详细信息
来源: 评论
CRYPTEX Model for E-Commercial Contract of software source code Using Secrete Sharing Scheme
CRYPTEX Model for E-Commercial Contract of Software Source C...
收藏 引用
3rd International Conference on Information Security and Assurance
作者: Cha, ByungRae Kim, YoungIl Chosun Univ Dept Informat & Commun Eng Kwangju South Korea Honam Univ Dept Internet Software Gwangju South Korea
software source code management needs it to improve the functioning of the information society. And there are management and security of software source code equivalent to assembly lines of important infrastructure in... 详细信息
来源: 评论
Management Framework of software source code and Copyrights - CPTEX Model of Secure Container -
Management Framework of Software Source Code and Copyrights ...
收藏 引用
International Conference on Security Technology
作者: Cha, ByungRae Kim, YongIl Oh, SukHee Kim, HaGang Honam Univ Dept Comp Engn Kwangju South Korea Honam Univ Dept Internet Software Kwangju South Korea Chonnam Natl Univ Coll Nursing Gwagju South Korea
software source code management uses it to improve the functioning of the information society. And there are management and security of software source code equivalent to assembly lines of important infrastructure in ... 详细信息
来源: 评论
Open-source software accelerates bioinformatics
收藏 引用
Genome biology 2003年 第9期4卷 336页
作者: John Quackenbush The Institute for Genomic Research 9712 Medical Center Drive Rockville MD 20850 USA. johnq@***
A report on the Wellcome Trust/Cold Spring Harbor Genome Informatics meeting, Cold Spring Harbor, USA, 7-11 May 2003.
来源: 评论