A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
AI Based False Positive Analysis of Software Vulnerabilities
2022
International Journal for Research in Applied Science and Engineering Technology
In this review, we propose a Machine Learning grouping based programming shortcoming forecast approach for this difficult issue ...
Solo methods like grouping might be utilized for issue expectation in programming modules, all the more so in those situations where shortcoming names are not accessible. ...
Detection Methods Using Differential Analysis [3]-They have propose D2A, a differential examination based way to deal with mark issues detailed by static investigation apparatuses. ...
doi:10.22214/ijraset.2022.42306
fatcat:vdhocro7pvhyzpgshefn6unmwe
VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements
[article]
2022
arXiv
pre-print
Although existing machine-learning-based approaches look promising in such a setting, most work detects vulnerable code at a higher granularity -- at the method or file level. ...
To study VELVET's effectiveness, we use an off-the-shelf synthetic dataset and a recently published real-world dataset. ...
Zheng et al. collected vulnerabilities using static program analysis and differential analysis. ...
arXiv:2112.10893v2
fatcat:3aani6xtgjafhiffnelpi3oe6a
Probing Model Signal-Awareness via Prediction-Preserving Input Minimization
[article]
2021
arXiv
pre-print
Using a software vulnerability detection use case, we evaluate the models' ability to capture the correct vulnerability signals to produce their predictions. ...
This work explores the signal awareness of AI models for source code understanding. ...
D2A is trace-level dataset built over multiple Github projects-OpenSSL, FFMpeg, HTTPD, Nginx and libtiff. ...
arXiv:2011.14934v2
fatcat:6g52jgnedndbzkphfmutk4a7za
Community-Based Flood Vulnerability Index for Urban Flooding: Understanding Social Vulnerabilities and Risks
[chapter]
2015
Advances in Hydroinformatics
Cette recherche a permis de démontrer que Dans ce travail de recherche, l'indice de vulnérabilité est lié aux variables intervenant dans la caractérisation de la résilience. ...
Community-Based Flood Vulnerability Index for Urban Flooding: Understanding Social Vulnerabilities and Risks ...
This would give us a bird's eye view of the river of which data can later be used for bacterial loading analysis and for other hydrological studies. ...
doi:10.1007/978-981-287-615-7_6
fatcat:4anjj6pd4vakrhtg3ferkq3nhe
Regulatory Analytics and Data Architecture (RADAR)
2015
Social Science Research Network
In the development of this conception, it is natural to adopt the emerging idea of a Social Machine, as a metaphor for the large-scale interaction of humans and machines via web connections. ...
In this paper, we develop a framework to consider how the technology forces of: faster computing; networked data portals; and growth in organizational models for parallelism might facilitate a new Regulatory ...
This research was supported by the Centre for International Finance and Regulation Project Number T-019: Regulatory Data Architecture and Analytics, which is a Centre of Excellence for research and education ...
doi:10.2139/ssrn.2628939
fatcat:picudx6dnnd2niaamjqmftgwaq
Adaptive Hierarchical Control in V2G Integrated Micro-grids
[article]
2021
A micro-grid test system based on a dc fast charging station is developed in order to utilize electric vehicle batteries for energy management. ...
The proposed ST controller uses recursive least squares identification with a variable forgetting factor for system identification, and pole-shifting control with a variable pole-shift factor for control ...
The selected integration method is ode45 which is used to solve non-stiff differential equations. ...
doi:10.11575/prism/38666
fatcat:z27sykbuurep7ecej7x5eb6qhm