Android source code vulnerability detection: a systematic literature review

J Senanayake, H Kalutarage, MO Al-Kadri… - ACM Computing …, 2023 - dl.acm.org
The use of mobile devices is rising daily in this technological era. A continuous and
increasing number of mobile applications are constantly offered on mobile marketplaces to …

Android mobile malware detection using machine learning: A systematic review

J Senanayake, H Kalutarage, MO Al-Kadri - Electronics, 2021 - mdpi.com
With the increasing use of mobile devices, malware attacks are rising, especially on Android
phones, which account for 72.2% of the total market share. Hackers try to attack …

A survey on machine learning techniques for source code analysis

T Sharma, M Kechagia, S Georgiou, R Tiwari… - arXiv preprint arXiv …, 2021 - arxiv.org
The advancements in machine learning techniques have encouraged researchers to apply
these techniques to a myriad of software engineering tasks that use source code analysis …

[HTML][HTML] A survey on machine learning techniques applied to source code

T Sharma, M Kechagia, S Georgiou, R Tiwari… - Journal of Systems and …, 2024 - Elsevier
The advancements in machine learning techniques have encouraged researchers to apply
these techniques to a myriad of software engineering tasks that use source code analysis …

A severity-based classification assessment of code smells in Kotlin and Java application

A Gupta, NK Chauhan - Arabian Journal for Science and Engineering, 2022 - Springer
Code smells instigate due to the consistent adoption of bad programming and
implementation styles during the evolution of the software which adversely affects the …

A security vulnerability predictor based on source code metrics

P Pakshad, A Shameli-Sendi… - Journal of Computer …, 2023 - Springer
Detecting security vulnerabilities in the source code of software systems is one of the most
important challenges in the field of software security. We need an effective solution to …

Software security measurements: A survey

A Almogahed, M Omar, NH Zakaria… - … , System and Service …, 2022 - ieeexplore.ieee.org
Security metrics for software products give a quantifiable assessment of a software system's
trustworthiness. Metrics can also help detect vulnerabilities in systems, prioritize corrective …

Developer's roadmap to design software vulnerability detection model using different ai approaches

S Pooja, CB Chandrakala, LK Raju - IEEE Access, 2022 - ieeexplore.ieee.org
Automatic software vulnerability detection has caught the eyes of researchers as because
software vulnerabilities are exploited vehemently causing major cyber-attacks. Thus …

Empirical evaluation of code smells in open-source software (OSS) using Best Worst Method (BWM) and TOPSIS approach

S Tandon, V Kumar, VB Singh - International Journal of Quality & …, 2022 - emerald.com
Purpose Code smells indicate deep software issues. They have been studied by
researchers with different perspectives. The need to study code smells was felt from the …

Analysis of heart disease using parallel and sequential ensemble methods with feature selection techniques: heart disease prediction

DC Yadav, S Pal - International Journal of Big Data and Analytics in …, 2021 - igi-global.com
This paper has organized a heart disease-related dataset from UCI repository. The
organized dataset describes variables correlations with class-level target variables. This …