AI Embedded Assurance for Cyber Systems by Unknown

AI Embedded Assurance for Cyber Systems by Unknown

Author:Unknown
Language: eng
Format: epub, pdf
ISBN: 9783031426377
Publisher: Springer International Publishing


The ASTs of the program samples to be accepted by our DL model, as well as edits on the ASTs, must follow the syntax defined by the ASDL. Figure 7.5 shows an example of AST that follows the syntax in Fig. 7.4. A member access expression (i.e., Obj1.Obj2) is parsed into an AST. “Obj1” is in IdentifierNameSyntax which is a successor of ExpressionSyntax. “.” is a SyntaxToken. “Obj2” is another IdentifierNameSyntax which is the successor of SimpleNameSyntax. The IdentifierNameSyntax node has other fields which follow its defined syntax.

Fig. 7.5 An example AST following the syntax defined by the corresponding ASDL



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.