Open Access
Issue |
JNWPU
Volume 43, Number 3, June 2025
|
|
---|---|---|
Page(s) | 600 - 609 | |
DOI | https://doi.org/10.1051/jnwpu/20254330600 | |
Published online | 11 August 2025 |
- ZHOU J, ZHANG M X. Survey on trustworthy software evaluation[J]. Application Research of Computers, 2012, 29(10): 3609–3613 [Google Scholar]
- LIU Ke, SHAN Zhiguang, WANG Ji, et al. Overview on major research plan of trustworthy software[J]. Bulletin of National Natural Science Foundation of China, 2008(3): 145–151 (in Chinese) [Google Scholar]
- LANG Bo, LIU Xudong, WANG Huaimin, et al. A classification model for software trustworthiness[J]. Journal of Frontiers of Computer Science and Technology, 2010, 4(3): 231–239 (in Chinese) [Google Scholar]
- LI S, LIU S. A software tool to support scenario-based formal specification for error prevention[J]. Lecture Notes in Computer Science, 2018, 10795: 187–199 [Google Scholar]
- WANG P, LIU S, LIU A Z F. A framework for modeling and detecting security vulnerabilities in human-machine pair programming[J]. Journal of Internet Technology, 2022, 23(5): 1129–1138 [Google Scholar]
- SCHUBERT P D, NIXDORF H, HERMANN B, et al. Lossless, persisted summarization of static callgraph, points-to and data-flow analysis[C]//Leibniz International Proceedings in Informatics, 2021 [Google Scholar]
- WANG P, LIU S, JIANG L W. Detecting security vulnerabilities with vulnerability nets[J]. The Journal of Systems and Software, 2024, 208: 111902 [Google Scholar]
- DAI Yujun, LIU Shaoying, XU Guangquan. Enhancing human-machine pair inspection with risk number and code inspection diagram[J]. Software Quality Journal, 2024, 32(3): 939–959 [Google Scholar]
- PAN Sen, LIN Yun, PENG Xin, et al. Visualised product quality monitoring tool based on software development process data[J]. Computer Applications and Software, 2015, 32(9): 8–12 (in Chinese) [Google Scholar]
- RONCHIERI E, CANAPARO M. A software quality predictive model[C]//International Conference on Software Engineering and Applications, 2013 [Google Scholar]
- BIELIKOVÁ M, POLÁŠEK I, BARLA M, et al. Platform independent software development monitoring: design of an architecture[J]. Lecture Notes in Computer Science, 2014, 8327: 126–137 [Google Scholar]
- ALLAMANIS M, BROCKSCHMIDT M, KHADEMI M. Learning to represent programs with graphs[C]//6th International Conference on Learning Representations, 2018 [Google Scholar]
- LAL H, PAHWA G. Code review analysis of software system using machine learning techniques[C]//2017 11th International Conference on Intelligent Systems and Control, 2017 [Google Scholar]
- SZABÓ Z, BILICKI V. A new approach to web application security: utilizing GPT language models for source code inspection[J]. Future Internet, 2023, 15(10): 326 [Google Scholar]
- GUPTA R, PAL S, KANADE A, et al. Deepfix: fixing common C language errors by deep learning[C]//National Conference on Artificial Intelligence, 2017 [Google Scholar]
- AHMED T, LEDESMA N R, DEVANBU P. Synshine: improved fixing of syntax errors[J]. IEEE Trans on Software Engineering, 2021, 49: 2169–2181 [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.