Please use this identifier to cite or link to this item:
Full metadata record
DC FieldValueLanguage
dc.contributor.authorNg, Shi Kai-
dc.description.abstractThe following report examines the security of using open source library. Even though open source libraries were designed to be secure via transparency, it is only secure if the weakest link, the users, update it constantly when new vulnerabilities are discovered. We also found out that a huge number of commercial applications are actually using open source libraries. Thus, in our project, we hope to identify which open source and its corresponding version commercial applications are using. From there, we can then observe if there are any vulnerabilities associated with the commercial applications analyzed. For the identification of the different projects used, we would utilize language processing models. We would extract n-grams and conduct Term Frequency – Inverse Document Frequency (tf-idf) analysis on the data collected. N-grams are bag of words that are removed from a document, where ‘n’ refers to the bag size. A bi-gram of ‘My first project’ for instance, would refer to bags of words of size 2, namely ‘my first’ and ‘first project’. Tfidf is a popular metric to determine if an n-gram uniquely identifies a document by analyzing its frequency of occurrence both within the document (term frequency) and in other documents (inverse document frequency). A high tf-idf score would indicate that the n-gram can accurately identify the document. This report only deals with a component of the project, namely the building of a database of bigram and trigram mapped to the projects analyzed.en_US
dc.format.extent27 p.en_US
dc.rightsNanyang Technological University-
dc.titleSolving real world security problems : hacking and protectionen_US
dc.typeFinal Year Project (FYP)en_US
dc.contributor.supervisorLiu Yangen_US
dc.contributor.schoolSchool of Computer Science and Engineeringen_US
dc.description.degreeBachelor of Engineering (Computer Science)en_US
item.fulltextWith Fulltext-
Appears in Collections:SCSE Student Reports (FYP/IA/PA/PI)
Files in This Item:
File Description SizeFormat 
Ng Shi Kai SCE17-0457_final.pdf
  Restricted Access
1 MBAdobe PDFView/Open

Page view(s)

checked on Oct 25, 2020


checked on Oct 25, 2020

Google ScholarTM


Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.