2023
DOI: 10.1016/j.compeleceng.2023.108607
|View full text |Cite
|
Sign up to set email alerts
|

AI and Blockchain-based source code vulnerability detection and prevention system for multiparty software development

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…Nath et al proposed a score range map that identi es vulnerability to classify the source code of the software. There are encouraging quality reviews and controls of lead developers are also made available for review, with this scoring map, [31]. Bayram et al obtained systematic literature searches published in the eld of agile software development from Web of Science, Science Direct, Scopus and IEEE academic databases.…”
Section: Resultsmentioning
confidence: 99%
“…Nath et al proposed a score range map that identi es vulnerability to classify the source code of the software. There are encouraging quality reviews and controls of lead developers are also made available for review, with this scoring map, [31]. Bayram et al obtained systematic literature searches published in the eld of agile software development from Web of Science, Science Direct, Scopus and IEEE academic databases.…”
Section: Resultsmentioning
confidence: 99%
“…As explained in [45] and [46], testing is a critical phase to ensure that the software meets the specified requirements and functions correctly. It involves creating and executing test cases, identifying defects or bugs, and verifying that the software performs as intended.…”
Section: Figure 1 Typical Sdlc Modelmentioning
confidence: 99%
“…Software development is the process of creating, designing, coding, testing, and maintaining software systems [1]- [3]. It involves a combination of technical skills, problem-solving abilities, and creative thinking to translate concepts and requirements into functional software applications.…”
Section: Introductionmentioning
confidence: 99%
“…To alleviate the storage and computational burden in the blockchain, ref. [19] proposes the use of the IPFS as an off-chain auxiliary storage for model files [43], reserving the blockchain solely for recording model-related information. Moreover, ref.…”
Section: Current Research Status Of Model Services For Deep Learningmentioning
confidence: 99%