This paper discusses our work on using software engineering metrics (i.e., source code metrics) to classify an error message generated by a Static Code Analysis (SCA) tool as a true-positive, false-positive, or false-negative. Specifically, we compare the performance of Support Vector Machine (SVM), K-Nearest Neighbor (KNN), Random Forests, and Repeated Incremental Pruning to Produce Error Reduction (RIPPER) over eight datasets. The performance of the techniques is assessed by computing the F-measure metric, which is defined as the weighted harmonic mean of the precision and recall of the predicted model. The overall results of the study show that the F-measure value of the predicted model, which is generated using Random Forests technique,...
Static program analysis is a technique to analyse code without executing it, and can be used to find...
An increasing digital world, comes with many benefits but unfortunately also many drawbacks. The inc...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
Indiana University-Purdue University Indianapolis (IUPUI)This dissertation proposes an approach to r...
This is a replication data package for a paper titled "Static Code Analysis Alarms Filtering Reloade...
Static analysis tools report software defects that may or may not be detected by other verification ...
Static analysis tools analyze source code and report suspected problems as warnings to the user. Th...
Static analysis tools report software defects that may or may not be detected by other verification ...
Static analysis can be useful for developers to detect critical security flaws and bugs in software....
Static analysis tools report software defects that may or may not be detected by other verification ...
Static analysis tools report software defects that may or may not be detected by other verification ...
Static code analysis tools are known to flag a large number of false positives. A false positive is ...
“This material is presented to ensure timely dissemination of scholarly and technical work. Copyrigh...
Many studies have been carried out to predict the presence of software code defects using static cod...
Indiana University-Purdue University Indianapolis (IUPUI)Static code analysis tools are known to fla...
Static program analysis is a technique to analyse code without executing it, and can be used to find...
An increasing digital world, comes with many benefits but unfortunately also many drawbacks. The inc...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
Indiana University-Purdue University Indianapolis (IUPUI)This dissertation proposes an approach to r...
This is a replication data package for a paper titled "Static Code Analysis Alarms Filtering Reloade...
Static analysis tools report software defects that may or may not be detected by other verification ...
Static analysis tools analyze source code and report suspected problems as warnings to the user. Th...
Static analysis tools report software defects that may or may not be detected by other verification ...
Static analysis can be useful for developers to detect critical security flaws and bugs in software....
Static analysis tools report software defects that may or may not be detected by other verification ...
Static analysis tools report software defects that may or may not be detected by other verification ...
Static code analysis tools are known to flag a large number of false positives. A false positive is ...
“This material is presented to ensure timely dissemination of scholarly and technical work. Copyrigh...
Many studies have been carried out to predict the presence of software code defects using static cod...
Indiana University-Purdue University Indianapolis (IUPUI)Static code analysis tools are known to fla...
Static program analysis is a technique to analyse code without executing it, and can be used to find...
An increasing digital world, comes with many benefits but unfortunately also many drawbacks. The inc...
Due to copyright restrictions, the access to the full text of this article is only available via sub...