2021
DOI: 10.1155/2021/8522839
|View full text |Cite|
|
Sign up to set email alerts
|

[Retracted] Software Systems Security Vulnerabilities Management by Exploring the Capabilities of Language Models Using NLP

Abstract: Security of the software system is a prime focus area for software development teams. This paper explores some data science methods to build a knowledge management system that can assist the software development team to ensure a secure software system is being developed. Various approaches in this context are explored using data of insurance domain-based software development. These approaches will facilitate an easy understanding of the practical challenges associated with actual-world implementation. This pap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 15 publications
(18 citation statements)
references
References 51 publications
0
15
0
Order By: Relevance
“…A network is trained several times in this scenario; however, for each run, different bits of data are omitted from the network. When evaluating the durability of a model on small datasets, it is quite useful to use this training strategy [ 40 ]. This section presents the results of dividing the 24 data points into 6 ( N = 6) groups of about comparable size.…”
Section: Proposed Methodologymentioning
confidence: 99%
“…A network is trained several times in this scenario; however, for each run, different bits of data are omitted from the network. When evaluating the durability of a model on small datasets, it is quite useful to use this training strategy [ 40 ]. This section presents the results of dividing the 24 data points into 6 ( N = 6) groups of about comparable size.…”
Section: Proposed Methodologymentioning
confidence: 99%
“…In the first frame, the user sets the target's location by dragging a rectangle around it. For each target, numerous features are retrieved, and an adaptive selection measure is constructed based on the online feature ranking approach and the target's characteristics [ 21 ]. To adjust for motion on the moving platform, a technique known as block matching is used.…”
Section: Literature Surveymentioning
confidence: 99%
“…When calculating the amount of energy used by the execution of a specific strategy during the round under consideration, the amount of energy consumed by the execution of a specific strategy during the round under consideration is taken into account [ 23 ]. Among other things, this energy is required for the operations of detecting, collecting, calculating, and transferring data from nodes to the base station.…”
Section: Proposed Energy Protocol With Blockchainmentioning
confidence: 99%