Amanote Research

Amanote Research

    RegisterSign In

Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis

Proceedings - International Conference on Software Engineering - United States
doi 10.1109/icse.2007.54
Full Text
Open PDF
Abstract

Available in full text

Categories
Software
Date

May 1, 2007

Authors
Vinod GanapathyDavid KingTrent JaegerSomesh Jha
Publisher

IEEE


Related search

Security Mechanisms for Legacy Code Applications in GT3 Environment

English

Using Data Mining for Static Code Analysis of C

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2012English

COSAK: Code Security Analysis Kit

2004English

Reverse Engineering for Malicious Code Behavior Analysis Using Virtual Security Patching

International Journal of Computer Applications
2011English

Privacy Preserving Clustering in Data Mining Using VQ Code Book Generation

2012English

Data Mining for Security Applications: Mining Concept-Drifting Data Streams to Detect Peer to Peer Botnet Traffic

2008English

BGP Operations and Security

2015English

Graph Theoretic Lattice Mining Based on Formal Concept Analysis (FCA) Theory for Text Mining

International Journal on Advanced Science, Engineering and Information Technology
AgriculturalEngineeringComputer ScienceBiological Sciences
2017English

Mining Source Code to Automatically Split Identifiers for Software Analysis

2009English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy