Výsledky vyhľadávania - (( (statne OR stat) python code analysis ) OR ( (statnych OR stateeeee) python code analysis ))*
-
1
Autori: a ďalší
Zdroj: Clinical Nursing Research. Jun2024, Vol. 33 Issue 5, p355-369. 15p.
Predmety: *MENTAL depression risk factors, *RISK assessment, *PREDICTION models, *SOCIAL determinants of health, *RECEIVER operating characteristic curves, *QUESTIONNAIRES, *PRIMARY health care, *RETROSPECTIVE studies, *QUANTITATIVE research, *DESCRIPTIVE statistics, *NURSING interventions, *SURVEYS, *HEALTH behavior, *MEDICAL records, *ACQUISITION of data, *SOCIODEMOGRAPHIC factors, *MACHINE learning, *DATA analysis software, *ACCURACY, *COMPARATIVE studies, *SOCIAL classes, *SENSITIVITY & specificity (Statistics), *SOCIAL isolation, *ALGORITHMS, *REGRESSION analysis, *MENTAL depression, *EVALUATION
Geografický termín: FLORIDA
-
2
Autori: a ďalší
Prispievatelia: a ďalší
Zdroj: 54es Journées de Statistique de la SFdS
JDS 2023 - 54e Journées de Statistique de la SFds
https://hal.science/hal-04384220
JDS 2023 - 54e Journées de Statistique de la SFds, SFdS, Jul 2023, Bruxelles (BEL), Belgique. ⟨10.48550/arXiv.2303.13590⟩Predmety: Machine Learning (stat.ML), Machine Learning (cs.LG), Machine learning, neural networks, survival data, simulated data, missing data, [STAT.ML]Statistics [stat]/Machine Learning [stat.ML], [INFO.INFO-LG]Computer Science [cs]/Machine Learning [cs.LG], [STAT.AP]Statistics [stat]/Applications [stat.AP]
Geografické téma: Bruxelles (BEL), Belgium
Relation: hal-04384220; https://hal.science/hal-04384220; https://hal.science/hal-04384220/document; https://hal.science/hal-04384220/file/preprint_arxiv.pdf
-
3
Autori:
Prispievatelia:
Zdroj: instname:Universidad de Bogotá Jorge Tadeo Lozano ; reponame:Expeditio Repositorio Institucional UJTL
Predmety: Ingeniería, Máquinas, Automatización, Auditorías, Seguridad, Security auditing
Geografické téma: Colombia
Popis súboru: 58 páginas; application/pdf
Relation: Alon, U., Zilberstein, M., Levy, O., and Yahav, E. (2019). code2vec: learning distributed representations of code. Proc. ACM Program. Lang., 3(POPL):1– 29.; Antunes, N. and Vieira, M. (2009). Comparing the Effectiveness of Penetration Testing and Static Code Analysis on the Detection of SQL Injection Vulnerabilities in Web Services. In 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, pages 301–306, Shanghai, China. IEEE.; Chang, Y., Liu, B., Cong, L., Deng, H., Li, J., and Chen, Y. (2019). Vulnerability Parser: A Static Vulnerability Analysis System for Android Applications. J. Phys.: Conf. Ser., 1288:012053.; Chong, S., Guttman, J., Datta, A., Myers, A., Pierce, B., Schaumont, P., Sherwood, T., and Zeldovich, N. (2016). Report on the NSF Workshop on Formal Methods for Security. arXiv:1608.00678 [cs]. arXiv: 1608.00678.; Dauber, E., Caliskan, A., Harang, R., Shearer, G., Weisman, M., Nelson, F., and Greenstadt, R. (2019). Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments. Proceedings on Privacy Enhancing Technologies, 2019(3):389–408. arXiv: 1701.05681; Ferreira, A. M. and Kleppe, H. (2011). Effectiveness of Automated Application Penetration Testing Tools. Technical report, OS3 University of Amsterdam.; FluidAttacks (2020). Integrates.; Free Software Foundation (2020). GNU diffutils; Ghaffarian, S. M. and Shahriari, H. R. (2017). Software Vulnerability Analysis and Discovery Using Machine-Learning and Data-Mining Techniques: A Survey. ACM Computing Surveys, 50(4):1–36.; Li, Z., Zou, D., Xu, S., Jin, H., Zhu, Y., and Chen, Z. (2018a). SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities. arXiv:1807.06756 [cs, stat]. arXiv: 1807.06756.; Li, Z., Zou, D., Xu, S., Ou, X., Jin, H., Wang, S., Deng, Z., and Zhong, Y. (2018b). VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. Proceedings 2018 Network and Distributed System Security Symposium. arXiv: 1801.01681.; Moor, O. d., Verbaere, M., Hajiyev, E., Avgustinov, P., Ekman, T., Ongkingco, N., Sereni, D., and Tibble, J. (2007). Keynote Address: .QL for Source Code Analysis. In Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007), pages 3–16, Paris, France. IEEE; Ng, A. (2016). What Artificial Intelligence Can and Can’t Do Right Now. Harvard Business Review. Section: Analytics.; Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A., Cournapeau, D., Brucher, M., Perrot, M., and Duchesnay, E. (2011). Scikit-learn: Machine learning in Python. Journal of Machine Learning Research, 12:2825–2830.; Rice, H. G. (1953). Classes of recursively enumerable sets and their decision problems. Trans. Amer. Math. Soc., 74(2):358–366.; Schwartz, E. J., Avgerinos, T., and Brumley, D. (2010). All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask). In 2010 IEEE Symposium on Security and Privacy, pages 317–331, Oakland, CA, USA. IEEE.; Sommer, R. and Paxson, V. (2010). Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. In 2010 IEEE Symposium on Security and Privacy, pages 305–316, Oakland, CA, USA. IEEE.; Stefinko, Y., Piskozub, A., and Banakh, R. (2016). Manual and automated penetration testing. Benefits and drawbacks. Modern tendency. In 2016 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), pages 488–491, Lviv, Ukraine. IEEE.; Yamaguchi, F., Wressnegger, C., Gascon, H., and Rieck, K. (2013). Chucky: exposing missing checks in source code for vulnerability discovery. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS ’13, pages 499–510, Berlin, Germany. ACM Press.; http://hdl.handle.net/20.500.12010/17241; http://expeditio.utadeo.edu.co
-
4
Autori: a ďalší
Zdroj: Future Internet; Sep2025, Vol. 17 Issue 9, p412, 28p
-
5
Autori: a ďalší
Zdroj: Frontiers in Mammal Science. 2025, p1-27. 27p.
Plný text vo formáte HTML Plný text ve formátu PDF -
6
Autori:
Zdroj: Veterinary Sciences. Jan2026, Vol. 13 Issue 1, p88. 20p.
Plný text vo formáte HTML Plný text ve formátu PDF -
7
Autori:
Zdroj: Journal of Applied Clinical Medical Physics; Jul2025, Vol. 26 Issue 7, p1-9, 9p
-
8
Autori:
Zdroj: Mathematics (2227-7390); Dec2025, Vol. 13 Issue 23, p3764, 29p
-
9
Autori: a ďalší
Zdroj: Nutrients. Jan2026, Vol. 18 Issue 2, p232. 19p.
Plný text vo formáte HTML Plný text ve formátu PDF -
10
Autori: a ďalší
Zdroj: Frontiers in Veterinary Science. 2025, p1-13. 13p.
Plný text vo formáte HTML Plný text ve formátu PDF -
11
Autori: a ďalší
Zdroj: Journal of Animal Science & Biotechnology. 8/11/2025, Vol. 16 Issue 1, p1-21. 21p.
Plný text vo formáte HTML Plný text ve formátu PDF -
12
Autori: a ďalší
Zdroj: Veterinary Sciences. Oct2025, Vol. 12 Issue 10, p935. 17p.
Plný text vo formáte HTML Plný text ve formátu PDF -
13
Autori: a ďalší
Zdroj: Frontiers in Veterinary Science. 2026, p1-15. 15p.
Plný text vo formáte HTML Plný text ve formátu PDF -
14
Autori: a ďalší
Zdroj: Veterinary World. Jan2026, Vol. 19 Issue 1, p1-14. 14p.
Predmet: Multidrug resistance, Poultry farming, Holism, Enterococcus, Drug resistance in microorganisms, Escherichia coli, Anti-infective agents, Kenyans
Geografický termín: Kenya
Plný text ve formátu PDF -
15
Autori: a ďalší
Zdroj: Nutrients. Oct2025, Vol. 17 Issue 19, p3119. 12p.
Plný text vo formáte HTML Plný text ve formátu PDF -
16
Autori: a ďalší
Zdroj: BMC Veterinary Research. 10/6/2025, Vol. 21 Issue 1, p1-11. 11p.
Predmet: Peste des petits ruminants, Microbial virulence, Symptoms, Goats, Comparative studies, Seroconversion, Communicable disease control
Geografický termín: Ethiopia
Plný text vo formáte HTML Plný text ve formátu PDF -
17
Autori: Renna, Manuela (AUTHOR) manuela.renna@unito.it
Zdroj: Italian Journal of Animal Science. 2025 Suppl 1, Vol. 24 Issue 1, p1-463. 463p.
Predmet: Conferences & conventions
Plný text ve formátu PDF -
18
Autori: a ďalší
Zdroj: Nutrients. Oct2025, Vol. 17 Issue 19, p3075. 16p.
Plný text vo formáte HTML Plný text ve formátu PDF -
19
-
20
Autori: a ďalší
Zdroj: Bioinformatics; Sep2025, Vol. 41 Issue 9, p1-9, 9p
Nájsť tento článok vo Web of Science
Full Text Finder