Search Results - (( (stateeee OR stat) python code analysis ) OR ( (statne OR statenet) python code analysis ))

Refine Results
  1. 1
  2. 2

    Authors: Yao Y Zhang D Fan H et al.

    Source: Probiotics and antimicrobial proteins [Probiotics Antimicrob Proteins] 2025 May 21. Date of Electronic Publication: 2025 May 21.

    Publication Type: Journal Article

    Journal Info: Publisher: Springer Country of Publication: United States NLM ID: 101484100 Publication Model: Print-Electronic Cited Medium: Internet ISSN: 1867-1314 (Electronic) Linking ISSN: 18671306 NLM ISO Abbreviation: Probiotics Antimicrob Proteins Subsets: MEDLINE

  3. 3

    Source: Internal and emergency medicine [Intern Emerg Med] 2025 Apr 21. Date of Electronic Publication: 2025 Apr 21.

    Publication Type: Journal Article

    Journal Info: Publisher: Springer Country of Publication: Italy NLM ID: 101263418 Publication Model: Print-Electronic Cited Medium: Internet ISSN: 1970-9366 (Electronic) Linking ISSN: 18280447 NLM ISO Abbreviation: Intern Emerg Med Subsets: MEDLINE

  4. 4

    Authors: Blackledge MD Collins DJ Koh DM et al.

    Source: Computers in biology and medicine [Comput Biol Med] 2016 Feb 01; Vol. 69, pp. 203-12. Date of Electronic Publication: 2015 Dec 18.

    Publication Type: Journal Article

    Journal Info: Publisher: Elsevier Country of Publication: United States NLM ID: 1250250 Publication Model: Print-Electronic Cited Medium: Internet ISSN: 1879-0534 (Electronic) Linking ISSN: 00104825 NLM ISO Abbreviation: Comput Biol Med Subsets: MEDLINE

  5. 5

    Authors: Chen TH Lee CJ Chen SP et al.

    Source: Bioinformatics (Oxford, England) [Bioinformatics] 2025 Feb 04; Vol. 41 (2).

    Publication Type: Journal Article

    Journal Info: Publisher: Oxford University Press Country of Publication: England NLM ID: 9808944 Publication Model: Print Cited Medium: Internet ISSN: 1367-4811 (Electronic) Linking ISSN: 13674803 NLM ISO Abbreviation: Bioinformatics Subsets: MEDLINE

  6. 6

    Authors: Welbanks L Bell TJ Beatty TG et al.

    Source: Nature [Nature] 2024 Jun; Vol. 630 (8018), pp. 836-840. Date of Electronic Publication: 2024 May 20.

    Publication Type: Journal Article

    Journal Info: Publisher: Nature Publishing Group Country of Publication: England NLM ID: 0410462 Publication Model: Print-Electronic Cited Medium: Internet ISSN: 1476-4687 (Electronic) Linking ISSN: 00280836 NLM ISO Abbreviation: Nature Subsets: MEDLINE; PubMed not MEDLINE

  7. 7
  8. 8

    Authors: GENÇGÖNÜL, Betül Zehra1 betul.zehra@hacettepe.edu.tr

    Source: Kafkas Üniversitesi Veteriner Fakültesi Dergisi. Jan/Feb2026, Vol. 32 Issue 1, p147-153. 7p.

    PDF Full Text
  9. 9

    Source: instname:Universidad de Bogotá Jorge Tadeo Lozano ; reponame:Expeditio Repositorio Institucional UJTL

    Subject Geographic: Colombia

    File Description: 58 páginas; application/pdf

    Relation: Alon, U., Zilberstein, M., Levy, O., and Yahav, E. (2019). code2vec: learning distributed representations of code. Proc. ACM Program. Lang., 3(POPL):1– 29.; Antunes, N. and Vieira, M. (2009). Comparing the Effectiveness of Penetration Testing and Static Code Analysis on the Detection of SQL Injection Vulnerabilities in Web Services. In 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, pages 301–306, Shanghai, China. IEEE.; Chang, Y., Liu, B., Cong, L., Deng, H., Li, J., and Chen, Y. (2019). Vulnerability Parser: A Static Vulnerability Analysis System for Android Applications. J. Phys.: Conf. Ser., 1288:012053.; Chong, S., Guttman, J., Datta, A., Myers, A., Pierce, B., Schaumont, P., Sherwood, T., and Zeldovich, N. (2016). Report on the NSF Workshop on Formal Methods for Security. arXiv:1608.00678 [cs]. arXiv: 1608.00678.; Dauber, E., Caliskan, A., Harang, R., Shearer, G., Weisman, M., Nelson, F., and Greenstadt, R. (2019). Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments. Proceedings on Privacy Enhancing Technologies, 2019(3):389–408. arXiv: 1701.05681; Ferreira, A. M. and Kleppe, H. (2011). Effectiveness of Automated Application Penetration Testing Tools. Technical report, OS3 University of Amsterdam.; FluidAttacks (2020). Integrates.; Free Software Foundation (2020). GNU diffutils; Ghaffarian, S. M. and Shahriari, H. R. (2017). Software Vulnerability Analysis and Discovery Using Machine-Learning and Data-Mining Techniques: A Survey. ACM Computing Surveys, 50(4):1–36.; Li, Z., Zou, D., Xu, S., Jin, H., Zhu, Y., and Chen, Z. (2018a). SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities. arXiv:1807.06756 [cs, stat]. arXiv: 1807.06756.; Li, Z., Zou, D., Xu, S., Ou, X., Jin, H., Wang, S., Deng, Z., and Zhong, Y. (2018b). VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. Proceedings 2018 Network and Distributed System Security Symposium. arXiv: 1801.01681.; Moor, O. d., Verbaere, M., Hajiyev, E., Avgustinov, P., Ekman, T., Ongkingco, N., Sereni, D., and Tibble, J. (2007). Keynote Address: .QL for Source Code Analysis. In Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007), pages 3–16, Paris, France. IEEE; Ng, A. (2016). What Artificial Intelligence Can and Can’t Do Right Now. Harvard Business Review. Section: Analytics.; Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A., Cournapeau, D., Brucher, M., Perrot, M., and Duchesnay, E. (2011). Scikit-learn: Machine learning in Python. Journal of Machine Learning Research, 12:2825–2830.; Rice, H. G. (1953). Classes of recursively enumerable sets and their decision problems. Trans. Amer. Math. Soc., 74(2):358–366.; Schwartz, E. J., Avgerinos, T., and Brumley, D. (2010). All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask). In 2010 IEEE Symposium on Security and Privacy, pages 317–331, Oakland, CA, USA. IEEE.; Sommer, R. and Paxson, V. (2010). Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. In 2010 IEEE Symposium on Security and Privacy, pages 305–316, Oakland, CA, USA. IEEE.; Stefinko, Y., Piskozub, A., and Banakh, R. (2016). Manual and automated penetration testing. Benefits and drawbacks. Modern tendency. In 2016 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), pages 488–491, Lviv, Ukraine. IEEE.; Yamaguchi, F., Wressnegger, C., Gascon, H., and Rieck, K. (2013). Chucky: exposing missing checks in source code for vulnerability discovery. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS ’13, pages 499–510, Berlin, Germany. ACM Press.; http://hdl.handle.net/20.500.12010/17241; http://expeditio.utadeo.edu.co

  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20