Application of the law of minimum and dissimilarity analysis to Regression Test Case Prioritization

E Ufuktepe, T Tuglular - IEEE Access, 2023 - ieeexplore.ieee.org
Regression testing is one of the most expensive processes in testing. Prioritizing test cases
in regression testing is critical for the goal of detecting the faults sooner within a large set of …

How to Manage Change-Induced Incidents? Lessons from the Study of Incident Life Cycle

Y Zhao, L Jiang, Y Tao, S Zhang, C Wu… - 2023 IEEE 34th …, 2023 - ieeexplore.ieee.org
In online service systems, software changes cause a majority of incidents (ie, unplanned
interruptions and outages). Managing change-induced incidents efficiently is crucial for …

Detecting software code vulnerabilities using 2D convolutional neural networks with program slicing feature maps

A Watson, E Ufuktepe… - 2022 IEEE Applied …, 2022 - ieeexplore.ieee.org
Throughout the post-PC world, IoT devices and real-time embedded systems have
integrated themselves into every aspect of our lives. However, as technology integrates …

Predicting Change-Proneness with a Deep Learning Model: Incorporating Structural Dependencies

Y Hu, H Jiang - 2024 IEEE 48th Annual Computers, Software …, 2024 - ieeexplore.ieee.org
Change-proneness prediction aims to identify source files that deserve developers' attention
for early quality improvement, ultimately reducing future maintenance costs. Existing studies …

An Empirical Study on Code Smell Introduction and Removal in Deep Learning Software Projects

J Kim, E Lee - International Journal of Software Engineering and …, 2023 - World Scientific
With increasing popularity of Deep Learning (DL) software development, code quality issues
arise in DL software development. Code smell is one of the factors which reduce the quality …

[PDF][PDF] CoEdPilot: Recommending Code Edits with Learned Prior Edit Relevance, Project-wise Awareness, and Interactive Nature

C Liu, Y Cai, Y Lin, Y Huang, Y Pei, B Jiang, P Yang… - 2024 - chenyan1999.github.io
Recent years have seen the development of LLM-based code generation. Compared to
generating code in a software project, incremental code edits are empirically observed to be …

A novel transformer-based multi-step approach for predicting common vulnerability severity score

S Bahmanisangesari - 2024 - unbscholar.lib.unb.ca
The timely prediction of Common Vulnerability Severity Scores (CVSS) following the release
of Common Vulnerabilities and Exposures (CVE) announcements is crucial for enhancing …

Log4shell Investigate Based On Generic Computer Forensic Investigation Model

U Changsan, P Boonyopakorn - 2023 20th International …, 2023 - ieeexplore.ieee.org
Log 4Shel1 (CVE-2021-44228) Vulnerability was disclosed on November 24, 2021. It is
loophole from JAVA application which is a ubiquitous library of Log4j for logging framework …