Pseudo-Code Attack (PCA) in Software Engineering

Abstract

Software development has been more important in recent technological advancements in both hardware and software. The creation of scripting languages is critical to the development of software. The development of programming languages is applicable to software metric calculations such as line of code, code minimization, re-usability, and so on. Various attacks may be carried out during the metric computation phases in order to decrease the model parameters and delay the software package offering. Many attacks in networks have been discovered and avoided; this Pseudo-code assault is a new technique for boosting metric estimation in software development. This article suggested a method for introducing the Pseudo-code threat and detecting the presence of the Pseudo-code assault in the code base. Estimated size and duration are key quality assurance metrics in software development process. Software quality is measured by the average time between failures and the number of defects per line of code.

Authors and Affiliations

Sushil Bhardwaj

Keywords

Related Articles

A Novel Rhombus Shaped Multiband Antenna for Wireless Applications

A 30X20X1.6mm3 Novel Rhombus Shaped ring type multiband Antenna was proposed in this paper. The Antenna has 25x15mm2 partial ground inserted below the FR4 Epoxy Substrate to improve performance of Antenna. In addition,...

Comprehensive Review on Machine Learning Applications in Cloud Computing

Cloud computing provides on-demand access to a variety of processing, storage, and network resources. Over the past few years, cloud computing has become a widely accepted computing paradigm and one of the fastest-growin...

Chip Floorplanning Optimization Using Deep Reinforcement Learning

This paper presents a new method for chip floorplanning optimization using deep learning (DRL) combined with graph neural networks (GNNs). The plan addresses the challenges of traditional floor plans by applying AI to sp...

Boomerang Analysis of Permutation Function of 3D-AES Block Cipher

Boomerang analysis is a type of differential attack that use two bits of key difference and comparing both to examine any differences in bit after encryption. This paper describe boomerang analysis of permutation functio...

Stabilization of Black Cotton Soil Using Terrazyme and Rice Hush Ash

Construction on the black cotton soil, a form of troublesome expanding soil, has various difficulties. It has a swollen and impermeable nature with poor sub grade geotechnical properties. This study takes a stab at impro...

Download PDF file
  • EP ID EP747140
  • DOI 10.55524/ijircst.2021.9.6.60
  • Views 29
  • Downloads 0

How To Cite

Sushil Bhardwaj (2021). Pseudo-Code Attack (PCA) in Software Engineering. International Journal of Innovative Research in Computer Science and Technology, 9(6), -. https://europub.co.uk/articles/-A-747140