Proceedings of the 6th International Conference on Information and Education Technology 2018
DOI: 10.1145/3178158.3178202
|View full text |Cite
|
Sign up to set email alerts
|

Learning secure programming in open source software communities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 34 publications
0
11
0
Order By: Relevance
“…In view of the gap in the skills and knowledge necessary for secure OSS development, the lack of appropriate security competencies is clear. OSS developers or other participants do not traditionally receive formal education or training about software security [75]. Programmers make security errors because they are unaware that their code will be attacked, and have no knowledge of methods by which their code can be secured [76].…”
Section: Discussionmentioning
confidence: 99%
“…In view of the gap in the skills and knowledge necessary for secure OSS development, the lack of appropriate security competencies is clear. OSS developers or other participants do not traditionally receive formal education or training about software security [75]. Programmers make security errors because they are unaware that their code will be attacked, and have no knowledge of methods by which their code can be secured [76].…”
Section: Discussionmentioning
confidence: 99%
“…Flipout is an efficient method to improve variance reduction by implicitly sampling pseudo-independent stochastic weights for each training data and therefore decorrelating the gradients within a batch. For a more detailed description of the Flipout estimator, the reader is referred to Wen et al 49 A thorough description of the topology and training environment considered for both deterministic and Bayesian neural networks is showcased in Appendix A, providing details for each tested input monitoring setup. In general, the number of neurons included in the hidden layers of the BNNs is lower than the neurons specified for the deterministic counterparts.…”
Section: Bayesian Neural Networkmentioning
confidence: 99%
“…Flipout is an efficient method to improve variance reduction by implicitly sampling pseudo-independent stochastic weights for each training data and therefore decorrelating the gradients within a batch. For a more detailed description of the Flipout estimator, the reader is referred to Wen et al 49…”
Section: Experimental Campaign: Probabilistic Virtual Load Monitoring...mentioning
confidence: 99%
“…Hence, practitioners and researchers could use our methods to identify and evaluate the impact of any ecosystem's onboarding program. As a side note, the post-Covid-19 era fosters a culture of online collaboration that could disrupt the dynamics of in-person [59] events. Even though Rodeghero et al [60] studied onboarding during the Covid-19 pandemic at the project-level, it is still too early to understand the impact of this on the top-level SECO training events or the SECO onboarding process as a whole.…”
Section: Th R E a T S T O V A L Id It Ymentioning
confidence: 99%