Marco Vieira
YOU?
Author Swipe
View article: ANÁLISE DO USO DA ULTRASSONOGRAFIA TRANSVAGINAL NA DETECÇÃO PRECOCE DO CÂNCER DE OVÁRIO
ANÁLISE DO USO DA ULTRASSONOGRAFIA TRANSVAGINAL NA DETECÇÃO PRECOCE DO CÂNCER DE OVÁRIO Open
O câncer de ovário é uma das neoplasias ginecológicas mais letais, em grande parte devido ao diagnóstico tardio. Nesse contexto, a ultrassonografia transvaginal (USG-TV) tem sido investigada como estratégia de detecção precoce. Este estudo…
View article: SE Perspective on LLMs: Biases in Code Generation, Code Interpretability, and Code Security Risks
SE Perspective on LLMs: Biases in Code Generation, Code Interpretability, and Code Security Risks Open
Large Language Models (LLMs) are transforming the world with their ability to generate diverse content, including code, but embedded biases raise significant concerns. In this perspective piece, we critique the wide-spreading view of LLMs …
View article: APPLICATIONS OF FUNCTIONAL MAGNETIC RESONANCE IMAGING IN THE EARLY DIAGNOSIS OF PARKINSON DISEASE: A SYSTEMATIC REVIEW
APPLICATIONS OF FUNCTIONAL MAGNETIC RESONANCE IMAGING IN THE EARLY DIAGNOSIS OF PARKINSON DISEASE: A SYSTEMATIC REVIEW Open
Introduction: Parkinson disease (PD) is a progressive neurodegenerative disorder characterized by motor and non-motor symptoms that typically emerge after extensive dopaminergic neuronal loss. Functional magnetic resonance imaging (fMRI) h…
View article: Static Code Analysis for IoT Security: A Systematic Literature Review
Static Code Analysis for IoT Security: A Systematic Literature Review Open
The growth of the Internet of Things (IoT) has provided significant advances in several areas of the industry, but security concerns have also increased due to this expansion. Many IoT devices are the target of cyber attacks due to various…
View article: An Empirical Study on the Classification of Bug Reports Using Machine Learning Algorithms - Supplementary Material
An Empirical Study on the Classification of Bug Reports Using Machine Learning Algorithms - Supplementary Material Open
An Empirical Study on the Classification of Bug Reports Using Machine Learning Algorithms - Supplementary Material This repository is divided as follows: 1 -> Datasets: A zip file containing 52 CSV files, where each file includes issue rep…
View article: Avaliação da Robustez do Open vSwitch: Módulo do Kernel Linux
Avaliação da Robustez do Open vSwitch: Módulo do Kernel Linux Open
O Open vSwitch é uma implementação em software de um switch de rede multicamada projetado para o contexto de virtualização. Sua arquitetura engloba componentes nos espaços de usuário e kernel. Integrado ao kernel Linux desde 2012, o Open v…
View article: An Empirical Study on the Classification of Bug Reports with Machine Learning
An Empirical Study on the Classification of Bug Reports with Machine Learning Open
Software defects are a major threat to the reliability of computer systems. The literature shows that more than 30% of bug reports submitted in large software projects are misclassified (i.e., are feature requests, or mistakes made by the …
View article: A Survey on Survivable Safety-Critical Systems
A Survey on Survivable Safety-Critical Systems Open
Safety-critical systems (SCS) are essential in domains such as automotive, railway, e-health, nuclear power, and air transportation, where failure can result in catastrophic consequences. Due to their crucial functions, these systems are f…
View article: Blending Static and Dynamic Analysis for Web Application Vulnerability Detection: Methodology and Case Study
Blending Static and Dynamic Analysis for Web Application Vulnerability Detection: Methodology and Case Study Open
Static Analysis (SA) and Dynamic Analysis (DA) are complementary techniques for searching web application vulnerabilities. Typically, SA detects more vulnerabilities but reports a higher number of false positives, whereas DA finds less but…
View article: Engineering Trustworthy Software: A Mission for LLMs
Engineering Trustworthy Software: A Mission for LLMs Open
LLMs are transforming software engineering by accelerating development, reducing complexity, and cutting costs. When fully integrated into the software lifecycle they will drive design, development and deployment while facilitating early b…
View article: Mining Vulnerability and Code Repositories to Study Software Security
Mining Vulnerability and Code Repositories to Study Software Security Open
View article: Reabilitação física, psicológica e funcional de pacientes com Parkinson ou Parkinsonismo
Reabilitação física, psicológica e funcional de pacientes com Parkinson ou Parkinsonismo Open
Introdução: A Doença de Parkinson é uma condição neurodegenerativa que afeta o movimento e outras funções corporais, resultando na perda de células dopaminérgicas e no acúmulo de α-sinucleína no cérebro. Fatores genéticos e ambientais, alé…
View article: VulnLLMEval: A Framework for Evaluating Large Language Models in Software Vulnerability Detection and Patching
VulnLLMEval: A Framework for Evaluating Large Language Models in Software Vulnerability Detection and Patching Open
Large Language Models (LLMs) have shown promise in tasks like code translation, prompting interest in their potential for automating software vulnerability detection (SVD) and patching (SVP). To further research in this area, establishing …
View article: Evaluation of Time-Based Virtual Machine Migration as Moving Target Defense Against Host-Based Attacks
Evaluation of Time-Based Virtual Machine Migration as Moving Target Defense Against Host-Based Attacks Open
View article: A Survey on Survivable Safety-Critical Systems
A Survey on Survivable Safety-Critical Systems Open
View article: Delusional disorder’s evolution into dementia: a literature review of the original studies from the last 20 years
Delusional disorder’s evolution into dementia: a literature review of the original studies from the last 20 years Open
View article: Generating Realistic Attack Data for Microservices: Framework and Case Study
Generating Realistic Attack Data for Microservices: Framework and Case Study Open
Microservice applications have gained significant popularity due to their capability to decrease the complexity of developing highly scalable, manageable, and flexible systems. However, the microservices distributed nature, fine service gr…
View article: Advanced Machine Learning for Runtime Data Generation
Advanced Machine Learning for Runtime Data Generation Open
Given the ubiquity of software in everyday critical tasks, ensuring its dependability is of utmost importance. Software faults, which
\ncan lead to errors and vulnerabilities, can significantly comprise the target system. Various technique…
View article: Evaluation of Machine Learning for Intrusion Detection in Microservice Applications
Evaluation of Machine Learning for Intrusion Detection in Microservice Applications Open
Microservices have thrived recently as an approach for service design, development, and delivery. It provides several benefits to the systems as an architecture, such as faster delivery, improved scalability, and greater autonomy. Although…
View article: Leveraging Time Series Autocorrelation Through Numerical Differentiation for Improving Failure Prediction
Leveraging Time Series Autocorrelation Through Numerical Differentiation for Improving Failure Prediction Open
Given the complexity of modern software systems, it is no longer possible to detect every fault before deployment. Such faults can eventually lead to failures at runtime, compromising the business process and causing significant risk or lo…
View article: Fast Abstract Committees
Fast Abstract Committees Open
View article: Online Failure Prediction Through Fault Injection and Machine Learning: Methodology and Case Study
Online Failure Prediction Through Fault Injection and Machine Learning: Methodology and Case Study Open
Online Failure Prediction (OFP) is a technique that attempts to predict incoming failures to mitigate their consequences. Machine Learning (ML) has been successfully used to create predictive models for OFP, but failures are rare, and thus…
View article: An Integrated Maturity Model for modern software development: addressing Security, Artificial Intelligence and Governance in DevOps
An Integrated Maturity Model for modern software development: addressing Security, Artificial Intelligence and Governance in DevOps Open
Software is now a strategic asset for almost every business. As such, new technologies and features are needed, and so, AI-infused solutions are becoming more frequent. Also, as software is part of every infrastructure, even critical ones,…
View article: INTERNALIZED STIGMA – HOW WE VIEW OUR MENTAL ILLNESS
INTERNALIZED STIGMA – HOW WE VIEW OUR MENTAL ILLNESS Open
Introduction Stigma in mental health settings is described as a set of negative and unrealistic beliefs about those with mental illness. Authors suggest that stigma is consistently underdefined and overused, leading to resources toward pre…
View article: Repeated impulsive suicide attempts in patient with Parkinson disease treated with ropinirole
Repeated impulsive suicide attempts in patient with Parkinson disease treated with ropinirole Open
View article: Detecting Anomalies Through Sequential Performance Analysis in Virtualized Environments
Detecting Anomalies Through Sequential Performance Analysis in Virtualized Environments Open
Virtualization enables cloud computing, allowing for server consolidation with cost reduction. It also introduces new challenges in terms of security and isolation, which are deterrents for the adoption of virtualization in critical system…
View article: On the Use of Deep Graph CNN to Detect Vulnerable C Functions
On the Use of Deep Graph CNN to Detect Vulnerable C Functions Open
Software vulnerabilities are a problem in most software systems. If left unchecked, they can be exploited by malicious third parties to compromise the system, which can result in hazardous consequences. Over the years, several techniques h…
View article: Detecting DoS Attacks in Microservice Applications: Approach and Case Study
Detecting DoS Attacks in Microservice Applications: Approach and Case Study Open
A microservices-based architecture decreases the complexity of developing new systems, making them highly scalable and manageable. However, its distributed nature, the high granularity of services, and the large attack surface increase the…
View article: A Process for Finding and Tackling the Main Root Causes that Affect Critical Systems Quality
A Process for Finding and Tackling the Main Root Causes that Affect Critical Systems Quality Open
Following standards and applying good engineering practices during software development is not enough to guarantee defects free software, thus additional processes, such as Independent Software Verification and Validation (ISVV), are requi…
View article: Robustness and Fault Injection for the Validation of Critical Systems
Robustness and Fault Injection for the Validation of Critical Systems Open
Critical systems are nowadays being deployed as services or web applications, and are being used to provide enterprise-level business-critical operations. These systems are supported by complex middleware, which often links different syste…