Picture for Muhammed Fatih Bulut

Muhammed Fatih Bulut

Predicting the Impact of Batch Refactoring Code Smells on Application Resource Consumption

Add code
Jun 27, 2023
Figure 1 for Predicting the Impact of Batch Refactoring Code Smells on Application Resource Consumption
Figure 2 for Predicting the Impact of Batch Refactoring Code Smells on Application Resource Consumption
Figure 3 for Predicting the Impact of Batch Refactoring Code Smells on Application Resource Consumption
Figure 4 for Predicting the Impact of Batch Refactoring Code Smells on Application Resource Consumption
Viaarxiv icon

Automated Compliance Blueprint Optimization with Artificial Intelligence

Add code
Jun 22, 2022
Figure 1 for Automated Compliance Blueprint Optimization with Artificial Intelligence
Figure 2 for Automated Compliance Blueprint Optimization with Artificial Intelligence
Figure 3 for Automated Compliance Blueprint Optimization with Artificial Intelligence
Figure 4 for Automated Compliance Blueprint Optimization with Artificial Intelligence
Viaarxiv icon

Vulnerability Prioritization: An Offensive Security Approach

Add code
Jun 22, 2022
Figure 1 for Vulnerability Prioritization: An Offensive Security Approach
Figure 2 for Vulnerability Prioritization: An Offensive Security Approach
Figure 3 for Vulnerability Prioritization: An Offensive Security Approach
Figure 4 for Vulnerability Prioritization: An Offensive Security Approach
Viaarxiv icon

Attack Techniques and Threat Identification for Vulnerabilities

Add code
Jun 22, 2022
Figure 1 for Attack Techniques and Threat Identification for Vulnerabilities
Figure 2 for Attack Techniques and Threat Identification for Vulnerabilities
Figure 3 for Attack Techniques and Threat Identification for Vulnerabilities
Figure 4 for Attack Techniques and Threat Identification for Vulnerabilities
Viaarxiv icon