Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Code property graph“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Code property graph" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Code property graph"
Saenpholphat, Varaporn, und Ping Zhang. „Conditional resolvability in graphs: a survey“. International Journal of Mathematics and Mathematical Sciences 2004, Nr. 38 (2004): 1997–2017. http://dx.doi.org/10.1155/s0161171204311403.
Der volle Inhalt der QuelleKlavžar, Sandi, Uroš Milutinović und Ciril Petr. „1-perfect codes in Sierpiński graphs“. Bulletin of the Australian Mathematical Society 66, Nr. 3 (Dezember 2002): 369–84. http://dx.doi.org/10.1017/s0004972700040235.
Der volle Inhalt der QuellePilongo, Jupiter, Leonard Mijares Paleta und Philip Lester P. Benjamin. „Vertex-weighted $(k_{1},k_{2})$ $E$-torsion Graph of Quasi Self-dual Codes“. European Journal of Pure and Applied Mathematics 17, Nr. 2 (30.04.2024): 1369–84. http://dx.doi.org/10.29020/nybg.ejpam.v17i2.4867.
Der volle Inhalt der QuelleZhao, Chunhui, Tengfei Tu, Cheng Wang und Sujuan Qin. „VulPathsFinder: A Static Method for Finding Vulnerable Paths in PHP Applications Based on CPG“. Applied Sciences 13, Nr. 16 (14.08.2023): 9240. http://dx.doi.org/10.3390/app13169240.
Der volle Inhalt der QuelleKunz, Immanuel, Konrad Weiss, Angelika Schneider und Christian Banse. „Privacy Property Graph: Towards Automated Privacy Threat Modeling via Static Graph-based Analysis“. Proceedings on Privacy Enhancing Technologies 2023, Nr. 2 (April 2023): 171–87. http://dx.doi.org/10.56553/popets-2023-0046.
Der volle Inhalt der QuellePaiva, José, José Leal und Álvaro Figueira. „Comparing semantic graph representations of source code: The case of automatic feedback on programming assignments“. Computer Science and Information Systems, Nr. 00 (2024): 4. http://dx.doi.org/10.2298/csis230615004p.
Der volle Inhalt der QuelleZhang, Ji, Baoming Bai, Xijin Mu, Hengzhou Xu, Zhen Liu und Huaan Li. „Construction and Decoding of Rate-Compatible Globally Coupled LDPC Codes“. Wireless Communications and Mobile Computing 2018 (2018): 1–14. http://dx.doi.org/10.1155/2018/4397671.
Der volle Inhalt der QuelleMa, Hehuan, Yatao Bian, Yu Rong, Wenbing Huang, Tingyang Xu, Weiyang Xie, Geyan Ye und Junzhou Huang. „Cross-dependent graph neural networks for molecular property prediction“. Bioinformatics 38, Nr. 7 (30.01.2022): 2003–9. http://dx.doi.org/10.1093/bioinformatics/btac039.
Der volle Inhalt der QuelleCao, Xiansheng, Junfeng Wang, Peng Wu und Zhiyang Fang. „VulMPFF: A Vulnerability Detection Method for Fusing Code Features in Multiple Perspectives“. IET Information Security 2024 (22.03.2024): 1–15. http://dx.doi.org/10.1049/2024/4313185.
Der volle Inhalt der QuelleFerreira, Mafalda, Miguel Monteiro, Tiago Brito, Miguel E. Coimbra, Nuno Santos, Limin Jia und José Fragoso Santos. „Efficient Static Vulnerability Analysis for JavaScript with Multiversion Dependency Graphs“. Proceedings of the ACM on Programming Languages 8, PLDI (20.06.2024): 417–41. http://dx.doi.org/10.1145/3656394.
Der volle Inhalt der QuelleDissertationen zum Thema "Code property graph"
Bertrand, Sébastien. „Modèle de maintenabilité logicielle par analyse statique du graphe de code du programme“. Electronic Thesis or Diss., Bordeaux, 2024. http://www.theses.fr/2024BORD0414.
Der volle Inhalt der QuelleThe high cost of software maintenance requires a focus on software maintainability. Although it emerges from the structure of the source code, its evaluation is subjective, as it depends on developers and the context. Current maintainability models tend to reduce maintainability to a one-dimensional score based on metrics, often poorly defined, which inadequately represent the structure of the code. Our work is based on the static analysis of code graphs to evaluate maintainability. It led to the development of Javanalyser, an open-source tool that automatically generates the code graph of a Java program. These graphs enabled the formalization of 33 static metrics as declarative queries, and allowed the successful replication of a study by Schnappinger et al. Our extension of the study confirmed the importance of size as a factor influencing maintainability, while also recognizing the impact of other metrics. This work opens the way to a deeper understanding of maintainability through a multidimensional representation that takes into account the variability between developers
Jiang, Wen. „Maximum Codes with the Identifiable Parent Property“. Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/14072.
Der volle Inhalt der QuelleBuchteile zum Thema "Code property graph"
Küchler, Alexander, und Christian Banse. „Representing LLVM-IR in a Code Property Graph“. In Lecture Notes in Computer Science, 360–80. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-22390-7_21.
Der volle Inhalt der QuelleLi, Wei, Xiang Li, Wanzheng Feng, Guanglu Jin, Zhihan Liu und Jing Jia. „Vulnerability Detection Based on Unified Code Property Graph“. In Web Information Systems and Applications, 359–70. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-6222-8_30.
Der volle Inhalt der QuelleGuan, Zhibin, Xiaomeng Wang, Wei Xin und Jiajie Wang. „Code Property Graph-Based Vulnerability Dataset Generation for Source Code Detection“. In Communications in Computer and Information Science, 584–91. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-9739-8_43.
Der volle Inhalt der QuelleXiao, Na, Jing Zeng, Qigui Yao und Xiuli Huang. „A Method of Firmware Vulnerability Mining and Verification Based on Code Property Graph“. In Advances in Artificial Intelligence and Security, 543–56. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06764-8_42.
Der volle Inhalt der QuelleSamy, Ahmed E., Zekarias T. Kefato und Šarūnas Girdzijauskas. „Data-Driven Self-Supervised Graph Representation Learning“. In Frontiers in Artificial Intelligence and Applications. IOS Press, 2023. http://dx.doi.org/10.3233/faia230325.
Der volle Inhalt der Quelle„A property of the number six“. In Designs, Graphs, Codes and their Links, 81–90. Cambridge University Press, 1991. http://dx.doi.org/10.1017/cbo9780511623714.008.
Der volle Inhalt der QuelleBeynier, Aurélie, Jean-Guy Mailly, Nicolas Maudet und Anaëlle Wilczynski. „Explaining the Lack of Locally Envy-Free Allocations“. In Frontiers in Artificial Intelligence and Applications. IOS Press, 2024. http://dx.doi.org/10.3233/faia240900.
Der volle Inhalt der QuelleFranses, Philip Hans. „Periodic Autoregressive Time Series Models“. In Periodicity and Stochastic Trends In Economic Time Series, 92–125. Oxford University PressOxford, 1996. http://dx.doi.org/10.1093/oso/9780198774532.003.0007.
Der volle Inhalt der QuelleDalton, David R. „General Comments“. In The Chemistry of Wine. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190687199.003.0026.
Der volle Inhalt der QuelleGreenlaw, Raymond, H. James Hoover und Walter L. Ruzzo. „P-Complete Algorithms“. In Limits to Parallel Computation. Oxford University Press, 1995. http://dx.doi.org/10.1093/oso/9780195085914.003.0012.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Code property graph"
Xiaomeng, Wang, Zhang Tao, Wu Runpu, Xin Wei und Hou Changyu. „CPGVA: Code Property Graph based Vulnerability Analysis by Deep Learning“. In 2018 10th International Conference on Advanced Infocomm Technology (ICAIT). IEEE, 2018. http://dx.doi.org/10.1109/icait.2018.8686548.
Der volle Inhalt der QuelleZhu, Chenguang, Tongshuai Wu, Ningning Cui, Xiong Zheng, Liwei Chen und Gang Shi. „Code Property Graph based Vulnerability Type Identification with Fusion Representation“. In 2023 26th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 2023. http://dx.doi.org/10.1109/cscwd57460.2023.10152662.
Der volle Inhalt der QuelleFelix, Juliana P., und Márcia R. Cappelle. „Bounds on Identifying Codes in the Cartesian Product of a Star and a Path Graph“. In Encontro de Teoria da Computação. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/etc.2023.230607.
Der volle Inhalt der QuelleHaojie, Zhang, Li Yujun, Liu Yiwei und Zhou Nanxin. „Vulmg: A Static Detection Solution For Source Code Vulnerabilities Based On Code Property Graph and Graph Attention Network“. In 2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP). IEEE, 2021. http://dx.doi.org/10.1109/iccwamtip53232.2021.9674145.
Der volle Inhalt der QuelleBanse, Christian, Immanuel Kunz, Angelika Schneider und Konrad Weiss. „Cloud Property Graph: Connecting Cloud Security Assessments with Static Code Analysis“. In 2021 IEEE 14th International Conference on Cloud Computing (CLOUD). IEEE, 2021. http://dx.doi.org/10.1109/cloud53861.2021.00014.
Der volle Inhalt der QuelleLi, Xiaoyu, Jingzheng Wu, Xiang Ling, Tianyue Luo und Yanjun Wu. „Automatic Program Repair via Learning Edits on Sequence Code Property Graph“. In 2023 IEEE 29th International Conference on Parallel and Distributed Systems (ICPADS). IEEE, 2023. http://dx.doi.org/10.1109/icpads60453.2023.00089.
Der volle Inhalt der QuelleDeaton, Sean. „What Makefile? Detecting Compiler Information Without Source Using The Code Property Graph“. In 2022 IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA). IEEE, 2022. http://dx.doi.org/10.1109/tps-isa56441.2022.00039.
Der volle Inhalt der QuelleDu, Gewangzi, Liwei Chen, Tongshuai Wu, Xiong Zheng und Gang Shi. „Code Property Graph based Cross-Domain Vulnerability Detection via Deep Fused Feature“. In 2024 IEEE International Symposium on Circuits and Systems (ISCAS). IEEE, 2024. http://dx.doi.org/10.1109/iscas58744.2024.10558497.
Der volle Inhalt der QuelleShezan, Faysal Hossain, Zihao Su, Mingqing Kang, Nicholas Phair, Patrick William Thomas, Michelangelo van Dam, Yinzhi Cao und Yuan Tian. „CHKPLUG: Checking GDPR Compliance of WordPress Plugins via Cross-language Code Property Graph“. In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2023. http://dx.doi.org/10.14722/ndss.2023.24610.
Der volle Inhalt der QuelleCui, Di, Qiangqiang Wang, Siqi Wang, Jianlei Chi, Jianan Li, Lu Wang und Qingshan Li. „REMS: Recommending Extract Method Refactoring Opportunities via Multi-view Representation of Code Property Graph“. In 2023 IEEE/ACM 31st International Conference on Program Comprehension (ICPC). IEEE, 2023. http://dx.doi.org/10.1109/icpc58990.2023.00034.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Code property graph"
Zhai, Liangliang, und Xuanlong Ma. Perfect Codes in Proper Order Divisor Graphs of Finite Groups. "Prof. Marin Drinov" Publishing House of Bulgarian Academy of Sciences, Dezember 2020. http://dx.doi.org/10.7546/crabs.2020.12.04.
Der volle Inhalt der QuelleFinancial Stability Report - Second Semester of 2020. Banco de la República de Colombia, März 2021. http://dx.doi.org/10.32468/rept-estab-fin.sem2.eng-2020.
Der volle Inhalt der Quelle