Premature ventricular contraction beat detection with deep neural networks

TJ Jun, HJ Park, NH Minh, D Kim… - 2016 15th IEEE …, 2016 - ieeexplore.ieee.org
A deep neural networks is proposed for the classification of premature ventricular
contraction (PVC) beat, which is an irregular heartbeat initiated by Purkinje fibers rather than …

Uncovering access control weaknesses and flaws with security-discordant software clones

F Gauthier, T Lavoie, E Merlo - Proceedings of the 29th annual computer …, 2013 - dl.acm.org
Software clone detection techniques identify fragments of code that share some level of
syntactic similarity. In this study, we investigate security-sensitive clone clusters: clusters of …

Fast detection of access control vulnerabilities in php applications

F Gauthier, E Merlo - 2012 19th Working Conference on …, 2012 - ieeexplore.ieee.org
Access control vulnerabilities in web applications are on the rise. In its 2010" Top 10 Most
Critical Web Applications Security Risks", the OWASP reported that the prevalence of access …

RBAC protection-impacting changes identification: A case study of the security evolution of two PHP applications

MA Laverdière, K Julien, E Merlo - Information and Software Technology, 2021 - Elsevier
Abstract: Web applications often use Role-Based Access Control (RBAC) to restrict
operations and protect security sensitive information and resources. Context: Web …

Classification and Distribution of RBAC Privilege Protection Changes in Wordpress Evolution (Short Paper)

MA Laverdière, E Merlo - … on Privacy, Security and Trust (PST), 2017 - ieeexplore.ieee.org
Role-Based Access Control (RBAC) is commonly used in web applications to protect
information and restrict operations. Their security may be affected by source code changes …

Detection of protection-impacting changes during software evolution

MA Laverdière, E Merlo - 2018 IEEE 25th International …, 2018 - ieeexplore.ieee.org
Role-Based Access Control (RBAC) is often used in web applications to restrict operations
and protect security sensitive information and resources. Web applications regularly …

Computing counter-examples for privilege protection losses using security models

MA Laverdière, E Merlo - 2017 IEEE 24th International …, 2017 - ieeexplore.ieee.org
Role-Based Access Control (RBAC) is commonly used in web applications to protect
information and restrict operations. Code changes may affect the security of the application …

[图书][B] Just-in-time detection of protection-impacting changes on WordPress and MediaWiki

MA Barrak - 2018 - search.proquest.com
Access control mechanisms based on roles and privileges restrict the access of users to
security sensitive resources in a multi-user software system. Unintentional privilege …

Automatic Detection and Classification of Identifier Renamings

L Mousavi Eshkevari - 2015 - publications.polymtl.ca
Le lexique du code source joue un rôle primordial dans la maintenabilité des logiciels. Un
lexique pauvre peut induire à une mauvaise compréhension du programme et à …

[PDF][PDF] AUTOMATIC DETECTION AND CLASSIFICATION OF IDENTIFIERS

LM ESHKEVARI - 2015 - ptidej.net
Source code lexicon plays a paramount role in software maintainability: poor lexicon can
lead to poor comprehensibility and increase software fault-proneness. For this reason …