Search
Now showing items 1-10 of 87
Providing a Source Code Security Analysis Model Using Semantic Web Techniques
Year: 2015
Abstract:
.
To overcome the problem of variety of source code language, in this paper, an ontology approach for source code security analysis model has been used. In this model, the source code is represented in terms of the RDF triples. The security error patterns...
The Precision Array for Probing the Epoch of Reionization (PAPER): Overview and recent results
Publisher: IEEE
Year: 2014
An integrated success adoption model for examining E-learning among adult workers in Jordan
Publisher: IEEE
Year: 2014
Live-line working of non-ceramic insulators
Publisher: IEEE
Year: 2014
H<sup>+</sup> implantation profile formation in m:Cz and Fz silicon
Publisher: IEEE
Year: 2014
Specifying BPMN diagrams with Timed Automata: Proposal of some mapping rules
Publisher: IEEE
Year: 2014
A decision feedback equalizer with channel-dependent power consumption for 60-GHz receivers
Publisher: IEEE
Year: 2014
Time series prediction with a non-causal neural network
Publisher: IEEE
Year: 2014
A mathematical analysis of cellular interference on the performance of S-band military radar systems
Publisher: IEEE
Year: 2014