Resultados de búsqueda - "source code"

Buscar alternativas:

Limitar resultados
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Go Source Code Vulnerability Detection Method Based on Graph Neural Network por Lisha Yuan, Yong Fang, Qiang Zhang, Zhonglin Liu, Yijia Xu

    Publicado 2025-06-01

    With the widespread application of the Go language, the demand for vulnerability detection in Go programs is increasing. Existing detection models and methods have deficiencies in extracting source code features of Go programs and mainly focus on detecting concurrency vulnerabilities. In response to...

    Descripción completa

    “…Existing detection models and methods have deficiencies in extracting source code features of Go programs and mainly focus on detecting concurrency vulnerabilities. …”
    Enlace del recurso
    Artículo
  6. 6

    Integrated Technique of Natural Language Texts and Source Codes Authorship Verification in the Academic Environment por Aleksandr Romanov, Anna Kurtukova, Anastasiia Fedotova, Alexander Shelupanov

    Publicado 2025-01-01

    The issue of text plagiarism in academic and educational environments is becoming increasingly relevant every year. The quality of research articles and works is declining due to students copying fragments of others’ works and using modern generative models for text and source code creati...

    Descripción completa

    Materias: Enlace del recurso
    Artículo
  7. 7

    Analysis of Methods and Tools for Detecting Sensitive Information in Source Code: Issues of Accuracy and Completeness por Sergey Lebed, Sophiia Ibragimova

    Publicado 2025-04-01

    In the context of widespread adoption of DevOps practices and increasing software system complexity, the issue of sensitive information leakage – such as API keys, passwords, and tokens – directly from source code and configuration files is becoming critically important. Such leaks can result in ser...

    Descripción completa

    Materias: Enlace del recurso
    Artículo
  8. 8

    Supercharged graphics : a programmer's source code toolbox / por Adams, Lee

    Publicado 1988
    Libro
  9. 9

    Applied cryptography : protocols, algorithms, and source code in C / por Schneier, Bruce, 1963-

    Publicado 1996
    Libro
  10. 10

    New Deep Learning-Based Approach for Source Code Generation: Application to Computer Vision Systems por Wafa Alshehri, Salma Kammoun Jarraya, Arwa Allinjawi

    Publicado 2025-07-01

    Deep learning has enabled significant progress in source code generation, aiming to reduce the manual, error-prone, and time-consuming aspects of software development. While many existing models rely on recurrent neural networks (RNNs) with sequence-to-sequence architectures, these approaches strugg...

    Descripción completa

    Materias: Enlace del recurso
    Artículo
  11. 11
  12. 12

    CVOTING: An Anonymous Ballot E-Voting System por Baghdad Science Journal

    Publicado 2018-03-01

    One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such...

    Descripción completa

    Materias: “…e-voting, open source, code voting, QR code.…”
    Enlace del recurso
    Artículo
  13. 13

    MODERN MEANS OF ELECTRONIC PROCESSING OF SOCIO-ECONOMIC INFORMATION por M. Bogdanova, L. Parshintseva

    Publicado 2017-05-01

    The article analyzes most popular software packages for statistical analysis of economic information, identified their merits and demerits, developed recommendations for choice of statistical packages

    Materias: Enlace del recurso
    Artículo
  14. 14

    PREDICTION OF NOISE FROM TURBULENT FLOW FOR AIRFOIL por V. T. Kalugin, A. S. Epikhin, S. V. Strijhak

    Publicado 2016-11-01

    The calculation of turbulent flow using LES model and prediction of sound generated by a rod-airfoil configuration was done using OpenFoam code and library libAcoustics. Good results are obtained for frequency and drag coefficients compared with results from experiment. The additional investigation...

    Descripción completa

    Materias: Enlace del recurso
    Artículo
  15. 15

    Vulnerability benchmark generation algorithm based on finite state machines por XIE Yuandong, YAN Xuexiong, ZHAO Guangsheng, ZHAO Xu, QIU Han

    Publicado 2025-06-01

    The emergence and development of various source code vulnerability detection techniques led to the evaluation of these tools’ effectiveness becoming a critical issue. Source code vulnerability benchmarks were regarded as a basic basis for such evaluations. However, most of the existing benchmarks we...

    Descripción completa

    “…Source code vulnerability benchmarks were regarded as a basic basis for such evaluations. …”
    Enlace del recurso
    Artículo
  16. 16

    A study on an efficient OSS inspection scheme based on encrypted GML por Seok-Joon Jang, Im-Yeong Lee, Daehee Seo, Su-Hyun Kim

    Publicado 2025-06-01

    The importance of Open Source Software (OSS) has increased in recent years. OSS is software that is jointly developed and maintained globally through open collaboration and knowledge sharing. OSS plays an important role, especially in the Information Technology (IT) field, by increasing the efficien...

    Descripción completa

    “…Some services analyze source code and provide OSS-related data to solve these problems, a representative example being Blackduck. …”
    Enlace del recurso
    Artículo
  17. 17

    THE TECHNIQUE OF ANALYSIS OF SOFTWARE OF ON-BOARD COMPUTERS OF AIR VESSEL TO ABSENCE OF UNDECLARED CAPABILITIES BY SIGNATURE-HEURISTIC WAY por V. I. Petrov

    Publicado 2017-03-01

    The article considers the issues of civil aviation aircraft onboard computers data safety. Information security undeclared capabilities stand for technical equipment or software possibilities, which are not mentioned in the documentation. Documentation and tests content requirements are imposed duri...

    Descripción completa

    “…If there are no software source codes the two approaches of code analysis are used: a structural static and dynamic analysis of the source code; signature-heuristic analysis of potentially dangerous operations. …”
    Enlace del recurso
    Artículo
  18. 18

    Beginning with C / por House, Ron (Ronald)

    Publicado 1994
    Libro
  19. 19

    C++ : the complete reference / por Schildt, Herbert

    Publicado 2003 Enlace del recurso
    Libro
  20. 20

    Using C in software design / por Leach, Ronald (Ronald J.)

    Publicado 1993
    Libro