[In-person]The Analysis of Effect Code Smells Family on Software Security Using SonarQube Tool

The Analysis of Effect Code Smells Family on Software Security Using SonarQube Tool
ID:84 Submission ID:36 View Protection:ATTENDEE Updated Time:2025-12-21 13:04:50 Hits:402 In-person

Start Time:2025-12-29 14:00 (Asia/Amman)

Duration:15min

Session:[S3] Track 3: Privacy, Security for Networks » [S3] Track 3: Privacy, Security for Networks

Presentation File

Tips: The file permissions under this presentation are only for participants. You have not logged in yet and cannot view it temporarily.

Abstract
In the current technological era, security is one of the most important requirements that must be met by systems, devices, and electronic programs because of the frequency of unwanted attacks on personal data. While there are numerous factors that could influence it, the smells of the code are the most significant. These smells have been explained and detailed to their families before academics and security specialists selected them as the most common.  The most prominent family among these was discovered to be the Bloaters family. The findings of using a SonarQube tool on the data after the form was evaluated were not all the same. The lengthy technique is the most prevalent and conspicuous member of its category. Whereas previous studies focused on establishing a connection between the smells of code and security, this study aimed to determine the most common odors that impact security. Whether or not a scent is identified, it is important to record it to get the maximum amount of focus and security.
 
Keywords
Software security,SonarQube tool,Code Smells
Speaker
Hamed Fawareh
prof. zarqa university

Submission Author
Hamed Fawareh zarqa university
Sohaip Khlifat zarqa university
Comment submit
Verification code Change another
All comments

CONTACT US

Email: asiancomnet@usssociety.org

Website & IT Support: hi@aconf.org 

Registration Submit Paper