<?xml version="1.0" encoding="utf-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2d1 20170631//EN" "JATS-journalpublishing1.dtd">
<ArticleSet>
  <Article>
    <Journal>
      <PublisherName>IJIRCSTJournal</PublisherName>
      <JournalTitle>International Journal of Innovative Research in Computer Science and Technology</JournalTitle>
      <PISSN>I</PISSN>
      <EISSN>S</EISSN>
      <Volume-Issue>Volume 9 Issue 6</Volume-Issue>
      <PartNumber/>
      <IssueTopic>Computer Science</IssueTopic>
      <IssueLanguage>English</IssueLanguage>
      <Season>November - December 2021</Season>
      <SpecialIssue>N</SpecialIssue>
      <SupplementaryIssue>N</SupplementaryIssue>
      <IssueOA>Y</IssueOA>
      <PubDate>
        <Year>2022</Year>
        <Month>02</Month>
        <Day>01</Day>
      </PubDate>
      <ArticleType>Computer Sciences</ArticleType>
      <ArticleTitle>Pseudo-Code Attack (PCA) in Software Engineering</ArticleTitle>
      <SubTitle/>
      <ArticleLanguage>English</ArticleLanguage>
      <ArticleOA>Y</ArticleOA>
      <FirstPage>271</FirstPage>
      <LastPage>275</LastPage>
      <AuthorList>
        <Author>
          <FirstName>Sushil Bhardwaj</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>Y</CorrespondingAuthor>
          <ORCID/>
             
        </Author>
      </AuthorList>
      <DOI> https://doi.org/10.55524/ijircst.2021.9.6.60</DOI>
      <Abstract>Software development has been more important in recent technological advancements in both hardware and software. The creation of scripting languages is critical to the development of software. The development of programming languages is applicable to software metric calculations such as line of code, code minimization, re-usability, and so on. Various attacks may be carried out during the metric computation phases in order to decrease the model parameters and delay the software package offering. Many attacks in networks have been discovered and avoided; this Pseudo-code assault is a new technique for boosting metric estimation in software development. This article suggested a method for introducing the Pseudo-code threat and detecting the presence of the Pseudo-code assault in the code base. Estimated size and duration are key quality assurance metrics in software development process. Software quality is measured by the average time between failures and the number of defects per line of code.</Abstract>
      <AbstractLanguage>English</AbstractLanguage>
      <Keywords>Engineering, Pseudo-Code Attack, Software, Software Development.</Keywords>
      <URLs>
        <Abstract>https://ijircst.org/abstract.php?article_id=680</Abstract>
      </URLs>      
    </Journal>
  </Article>
</ArticleSet>