The Analysis of Effect Code Smells Family on Software Security Using SonarQube Tool
编号:84 访问权限:仅限参会人 更新:2025-12-21 13:04:50 浏览:208次 拓展类型1

报告开始:2025年12月29日 14:00(Asia/Amman)

报告时间:15min

所在会场:[S3] Track 3: Privacy, Security for Networks [S3] Track 3: Privacy, Security for Networks

演示文件

提示:该报告下的文件权限为仅限参会人,您尚未登录,暂时无法查看。

摘要
In the current technological era, security is one of the most important requirements that must be met by systems, devices, and electronic programs because of the frequency of unwanted attacks on personal data. While there are numerous factors that could influence it, the smells of the code are the most significant. These smells have been explained and detailed to their families before academics and security specialists selected them as the most common.  The most prominent family among these was discovered to be the Bloaters family. The findings of using a SonarQube tool on the data after the form was evaluated were not all the same. The lengthy technique is the most prevalent and conspicuous member of its category. Whereas previous studies focused on establishing a connection between the smells of code and security, this study aimed to determine the most common odors that impact security. Whether or not a scent is identified, it is important to record it to get the maximum amount of focus and security.
 
关键词
Software security,SonarQube tool,Code Smells
报告人
Hamed Fawareh
prof. zarqa university

稿件作者
Hamed Fawareh zarqa university
Sohaip Khlifat zarqa university
发表评论
验证码 看不清楚,更换一张
全部评论
重要日期
  • 会议日期

    12月29日

    2025

    12月31日

    2025

  • 12月30日 2025

    报告提交截止日期

  • 02月10日 2026

    初稿截稿日期

  • 02月10日 2026

    注册截止日期

主办单位
国际科学联合会
承办单位
扎尔卡大学
历届会议
移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询