Automatically identifying code features for software defect prediction: Using AST N-grams
نویسندگان
چکیده
منابع مشابه
Software defect prediction using static code metrics : formulating a methodology
Software defect prediction is motivated by the huge costs incurred as a result of software failures. In an effort to reduce these costs, researchers have been utilising software metrics to try and build predictive models capable of locating the most defect-prone parts of a system. These areas can then be subject to some form of further analysis, such as a manual code review. It is hoped that su...
متن کاملSource Code Authorship Attribution using n-grams
Plagiarism and copyright infringement are major problems in academic and corporate environments. Existing solutions for detecting infringements in structured text such as source code are restricted to textual similarity comparisons of two pieces of work. In this paper, we examine authorship attribution as a means for tackling plagiarism detection. Given several samples of work from several auth...
متن کاملIdentifying Sentiments in N-grams
Our proposal, identifying sentiments in N -grams (ISN), focuses on both word order and phrases, and the interdependency between specific ratings and corresponding sentiments in texts to detect subjective information.
متن کاملDetection of New Malicious Code Using N-grams Signatures
Signature-based malicious code detection is the standard technique in all commercial anti-virus software. This method can detect a virus only after the virus has appeared and caused damage. Signature-based detection performs poorly when attempting to identify new viruses. Motivated by the standard signature-based technique for detecting viruses, and a recent successful text classification metho...
متن کاملIdentifying Authorship by Byte-Level N-Grams:
Source code author identification deals with identifying the most likely author of a computer program, given a set of predefined author candidates. There are several scenarios where digital evidence of this kind plays a role in investigation and adjudication, such as code authorship disputes, intellectual property infringement, tracing the source of code left in the system after a cyber attack,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information and Software Technology
سال: 2019
ISSN: 0950-5849
DOI: 10.1016/j.infsof.2018.10.001