Current machine-learning based software vulnerability detection methods are primarily conducted at the function-level. However, a key limitation of these methods is that they do …
This research focuses on optimizing the prediction of discharge coefficient (Cd) of triangular side orifices (TSO) using a novel stacked model (SM) incorporating five machine learning …
The main function of an optimizer is to determine in what measure to change the weights and the learning rate of the neural network to reduce losses. One of the best known …
Infrastructure-as-code (IaC) is the DevOps practice enabling management and provisioning of infrastructure through the definition of machine-readable files, hereinafter referred to as …
THM Le, D Hin, R Croft… - 2021 36th IEEE/ACM …, 2021 - ieeexplore.ieee.org
It is increasingly suggested to identify Software Vulnerabilities (SVs) in code commits to give early warnings about potential security risks. However, there is a lack of effort to assess …
M Esposito, D Falessi - Information and Software Technology, 2024 - Elsevier
Context: Vulnerabilities are an essential issue today, as they cause economic damage to the industry and endanger our daily life by threatening critical national security infrastructures …
R Croft, D Newlands, Z Chen, MA Babar - Proceedings of the 15th ACM …, 2021 - dl.acm.org
Background: Static Application Security Testing (SAST) tools purport to assist developers in detecting security issues in source code. These tools typically use rule-based approaches to …
Context Advances in defect prediction models, aka classifiers, have been validated via accuracy metrics. Effort-aware metrics (EAMs) relate to benefits provided by a classifier in …
S Tabassum, LL Minku, D Feng - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Cross-Project (CP) Just-In-Time Software Defect Prediction (JIT-SDP) makes use of CP data to overcome the lack of data necessary to train well performing JIT-SDP classifiers at the …