6 Hits in 7.4 sec

AI Based False Positive Analysis of Software Vulnerabilities

Priya Patil
2022 International Journal for Research in Applied Science and Engineering Technology  
In this review, we propose a Machine Learning grouping based programming shortcoming forecast approach for this difficult issue  ...  Solo methods like grouping might be utilized for issue expectation in programming modules, all the more so in those situations where shortcoming names are not accessible.  ...  Detection Methods Using Differential Analysis [3]-They have propose D2A, a differential examination based way to deal with mark issues detailed by static investigation apparatuses.  ... 
doi:10.22214/ijraset.2022.42306 fatcat:vdhocro7pvhyzpgshefn6unmwe

VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements [article]

Yangruibo Ding, Sahil Suneja, Yunhui Zheng, Jim Laredo, Alessandro Morari, Gail Kaiser, Baishakhi Ray
2022 arXiv   pre-print
Although existing machine-learning-based approaches look promising in such a setting, most work detects vulnerable code at a higher granularity -- at the method or file level.  ...  To study VELVET's effectiveness, we use an off-the-shelf synthetic dataset and a recently published real-world dataset.  ...  Zheng et al. collected vulnerabilities using static program analysis and differential analysis.  ... 
arXiv:2112.10893v2 fatcat:3aani6xtgjafhiffnelpi3oe6a

Probing Model Signal-Awareness via Prediction-Preserving Input Minimization [article]

Sahil Suneja, Yunhui Zheng, Yufan Zhuang, Jim Laredo, Alessandro Morari
2021 arXiv   pre-print
Using a software vulnerability detection use case, we evaluate the models' ability to capture the correct vulnerability signals to produce their predictions.  ...  This work explores the signal awareness of AI models for source code understanding.  ...  D2A is trace-level dataset built over multiple Github projects-OpenSSL, FFMpeg, HTTPD, Nginx and libtiff.  ... 
arXiv:2011.14934v2 fatcat:6g52jgnedndbzkphfmutk4a7za

Community-Based Flood Vulnerability Index for Urban Flooding: Understanding Social Vulnerabilities and Risks [chapter]

Mae Brigitt Bernadel L. Villordon, Philippe Gourbesville
2015 Advances in Hydroinformatics  
Cette recherche a permis de démontrer que Dans ce travail de recherche, l'indice de vulnérabilité est lié aux variables intervenant dans la caractérisation de la résilience.  ...  Community-Based Flood Vulnerability Index for Urban Flooding: Understanding Social Vulnerabilities and Risks  ...  This would give us a bird's eye view of the river of which data can later be used for bacterial loading analysis and for other hydrological studies.  ... 
doi:10.1007/978-981-287-615-7_6 fatcat:4anjj6pd4vakrhtg3ferkq3nhe

Regulatory Analytics and Data Architecture (RADAR)

Kingsley Jones
2015 Social Science Research Network  
In the development of this conception, it is natural to adopt the emerging idea of a Social Machine, as a metaphor for the large-scale interaction of humans and machines via web connections.  ...  In this paper, we develop a framework to consider how the technology forces of: faster computing; networked data portals; and growth in organizational models for parallelism might facilitate a new Regulatory  ...  This research was supported by the Centre for International Finance and Regulation Project Number T-019: Regulatory Data Architecture and Analytics, which is a Centre of Excellence for research and education  ... 
doi:10.2139/ssrn.2628939 fatcat:picudx6dnnd2niaamjqmftgwaq

Adaptive Hierarchical Control in V2G Integrated Micro-grids [article]

Femina Mohammed Shakeel, University Of Calgary, Om Malik
A micro-grid test system based on a dc fast charging station is developed in order to utilize electric vehicle batteries for energy management.  ...  The proposed ST controller uses recursive least squares identification with a variable forgetting factor for system identification, and pole-shifting control with a variable pole-shift factor for control  ...  The selected integration method is ode45 which is used to solve non-stiff differential equations.  ... 
doi:10.11575/prism/38666 fatcat:z27sykbuurep7ecej7x5eb6qhm