ABSTRACT
With the rapid development of information technology, software systems' scales and complexity are showing a trend of expansion. The users' needs for the software security, software security reliability and software stability are growing increasingly. At present, the industry has applied machine learning methods to the fields of defect detection to repair and improve software defects through the massive data intelligent semantic analysis or code scanning. The model in machine learning is faced with big difficulty of model building, understanding, and the poor visualization in the field of traditional software defect detection. In view of the above problems, we present a point of view that intelligent semantic analysis technology based on massive data, and using the trusted behavior decision tree model to analyze the soft behavior by layered detection technology. At the same time, it is equipped related test environment to compare the tested software. The result shows that the defect detection technology based on intelligent semantic analysis of massive data is superior to other techniques at the cost of building time and error reported ratio.
- Yuan Jiang, Ming Li and Zhihua Zhou."Software Defect Detection with ROCUS." Journal of Computer Science & Technology, 2011(02): p. 328--342. Google ScholarDigital Library
- Chao Li."Concurrent Program Defect Detection Technology Based on Sequence Pattern Mining." Computer Science, 2015(Z11).Google Scholar
- Lei Tang, Chunping Li and Liu Yang. "Statistical Strategy Sequence Pattern Mining and Its Application in Software Defect Prediction."2013. 40(5): p. 164--167.Google Scholar
- Ran Yin. "Research on Software Defect Prediction Model Based on SAPSO - BP Network."2014, Southwest University.Google Scholar
- Xiaoan Bao, Xiaoming Xie, Na Zhang, Jian Wen Cao and Ning Gui." Software Optimization Strategy of Markov Model Based on Defect Correlation Degree." Journal of Software, 2015. 26(1): p. 14--25.Google Scholar
- Cuifang Zheng. "Research and Application of Software Defect Prediction Technology Based on Bayesian Network." 2006, China Academy of Engineering Physics.Google Scholar
- Xiuxiang Zhao, Yong Shi, Ying Liu and Lingling Zhang. "The Application of Text Classification in Software Defect Management."2009.Google Scholar
- Hu Lu, Yuqing Song, Wanyu Xue and Jing Xu. "An Analysis Method of Protocol Analysis Based on Regular Expression Matching." Computer Applications and Software, 2008. 25(3): p. 89--90.Google Scholar
- Fang Liu, Xing Gao, Bing Zhou and Juan Deng. "Software Defect Prediction Model Based on PCA - ISVM.", Computer Simulation, 2014(03): p. 397--401.Google Scholar
- Wencong Huang, Xiaoyuan Jing, Yongfang Yao and Fei Wu. "Software Defect Detection Based on Integrated Learning." Computer Technology and Development, 2015(10): p. 63--66.Google Scholar
- Kouwu Wang, Junming Zhang, Shigong Long and Fang Dong. "Research on Model Detection Algorithm Based on FSA." Journal of Guizhou University (Natural Science), 2012(05): p. 58--62.Google Scholar
- Li Jun Liu and Jinpeng Huai. "Research and Implementation of Network Scanning Detection Algorithm Based on Finite Automata." Journal of Computer Research and Development, 2006(03): p. 417--422.Google ScholarCross Ref
- Wen Li, Yingxia Dai, Yifeng Lian and Pinghui Feng. "Context-Dependent Host Intrusion Detection System Based on Hybrid Model." Journal of Software, 2009(01): p. 138--151.Google ScholarCross Ref
- Dandan Zhou and Xianguo Li. "Research on Software Defect Detection Model Based on Static Detection Tool." Computer and Modernization, 2012(11): p. 55--58.Google Scholar
- Lizhi Zhu. "A Misuse Detection Algorithm Based on Decision System and Decision Tree". Computer and Digital Engineering, 2016, 44(12):2353--2355.Google Scholar
- Weiwei Huang, Jianwei Ye and Hongli Zhang. "Research on Dynamic Detection Technology of Trojan Based on ID3 Decision Tree" Intelligent Computer and Application, 2011, 01(3):32--34.Google Scholar
- Gen Li. "Research on Binary Software Defect Automatic Mining Technology Based on Dynamic Test Cases " National University of Defense Technology, 2010.Google Scholar
Index Terms
- Research on Defect Detection Technology of Trusted Behavior Decision Tree Based on Intelligent Data Semantic Analysis of Massive Data
Recommendations
Developing a Bayesian Network Model Based on a State and Transition Model for Software Defect Detection
SNPD '12: Proceedings of the 2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed ComputingThis paper describes a Bayesian Network model-to diagnose the causes-effect of software defect detection in the process of software testing. The aim is to use the BN model to identify defective software modules for efficient software test in order to ...
Research on Database Massive Data Processing and Mining Method based on Hadoop Cloud Platform
IIKI '14: Proceedings of the 2014 International Conference on Identification, Information and Knowledge in the Internet of ThingsMassive image processing technology requiresvery high for the processor and memory, which need to adopthigh performance processor and large capacity memory,because the traditional single or single core processing andordinary memory already can not ...
Software defect detection with rocus
Software defect detection aims to automatically identify defective software modules for efficient software test in order to improve the quality of a software system. Although many machine learning methods have been successfully applied to the task, most ...
Comments