Pseudo-Code Attack (PCA) in Software Engineering
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2021, Vol 9, Issue 6
Abstract
Software development has been more important in recent technological advancements in both hardware and software. The creation of scripting languages is critical to the development of software. The development of programming languages is applicable to software metric calculations such as line of code, code minimization, re-usability, and so on. Various attacks may be carried out during the metric computation phases in order to decrease the model parameters and delay the software package offering. Many attacks in networks have been discovered and avoided; this Pseudo-code assault is a new technique for boosting metric estimation in software development. This article suggested a method for introducing the Pseudo-code threat and detecting the presence of the Pseudo-code assault in the code base. Estimated size and duration are key quality assurance metrics in software development process. Software quality is measured by the average time between failures and the number of defects per line of code.
Authors and Affiliations
Sushil Bhardwaj
The Role of Digital Health Technologies and Sensors in Revolutionizing Wearable Health Monitoring Systems
The rapid advancement of digital health technologies and sensor innovations has transformed wearable health monitoring systems, enabling unprecedented levels of personalized care, real-time health tracking, and early dis...
An Overview of Device-To-Device Communication in Cellular Networks
Gadget to-Device (D2D) correspondence was first recommended as another worldview for further developing organization execution in cell organizations. New use-cases for D2D correspondences in cell networks have arisen bec...
A Review of Big Data in Smart Farming
Intelligent agro is now a growing concept that accentuates employment of ICT inside cyber-physical farmland managerial chain. The said growth is projected to be accelerated by newer advancements such as the Internet of T...
Feature Extraction Techniques for Iris Recognition System: A Survey
The extraction of features involves the method of converting the original pixel values of an image to more meaningful, useful and measurable information that can be used in other techniques, such as image processing, pat...
Smart Document Analysis Using AI-ML
In this era of digitalization, everything is smart and digitalized. All the documents are presented, prepared and shared as soft copies. Classifying those soft copy documents is gaining an important insight in recent tim...